Skip to main content

A cli and package for validating secrets.

Project description

How2Validate

How2Validate is a security-focused tool designed to validate sensitive secrets by querying official secret provider endpoints. It provides real-time feedback on the authenticity of the credentials, ensuring that the secrets are valid.

Why How2Validate?

The need for How2Validate arises from the growing concern of exposing sensitive information in various applications, repositories, and environments. Leaked API keys, invalid credentials, and misconfigured secrets can lead to significant security vulnerabilities. How2Validate helps mitigate these risks by verifying secrets directly with the official providers before they are used in any system.

Features

  • Validate API keys, passwords, and sensitive information: It interacts with official provider authentication endpoints to ensure the authenticity of the secrets.
  • Cross-platform support: Packages available for JavaScript, Python, and Docker environments.
  • Easy to use: Simplifies secret validation with straightforward commands and functions.
  • Real-time feedback: Instantly know the status of your secrets — whether they are valid or not.

How It Works

How2Validate utilizes the official authentication endpoints provided by different service providers (like NPM, GitHub, Snyk, etc.) to validate secrets such as API keys, tokens, and other sensitive data. By querying these trusted endpoints, How2Validate ensures that the secrets are correct and not expired or invalid.

For every provider, How2Validate relies on well-maintained libraries and packages suggested by those providers to handle the authentication process.

Detailed CLI Help

The How2Validate tool provides multiple command-line options for validating secrets with precision.

To see all available commands, use:

how2validate --help

usage: How2Validate Tool [options]

Validate various types of secrets for different services.

options:
  -h, --help      show this help message and exit
  -secretscope    Explore the secret universe. Your next target awaits.
  -p, --provider  Specify your provider. Unleash your validation arsenal.
  -s, --service   Specify your target service. Validate your secrets with precision.
  -sec, --secret  Unveil your secrets to verify their authenticity.
  -r, --response  Monitor the status. View if your secret is Active or InActive.
  -R, --report    Get detailed reports. Receive validated secrets via email.
  -token          Secure your token in the vault, fetch it on demand, or shred it when done. (SubCommands: "delete", "list")
  -v, --version   Expose the version.
  --update        Hack the tool to the latest version.

Ensuring the authenticity of your secrets.

How to Utilize the Functions

How2Validate can be easily installed and used programmatically within Python projects.

Install the package:

pip install how2validate

Import the package and use the validate function:

from how2validate import validate

# Validate secrets programmatically
validation_result = validate(provider,service, secret, response, report)
print(validation_result)

Example Command:

Validate a secret

how2validate --provider NPM --service "NPM Access Token" --secret "<<SECRET_HERE>>"
-- OR --
how2validate -p NPM -s "NPM Access Token" -sec "<<SECRET_HERE>>"

Validate with response status

how2validate --provider NPM --service "NPM Access Token" --secret "<<SECRET_HERE>>" --response
-- OR --
how2validate -p NPM -s "NPM Access Token" -sec "<<SECRET_HERE>>" -r

Example usage of validate function:

from how2validate import validate

# Validate secrets programmatically
validation_result = validate(
    provider="NPM",
    service="NPM Access Token",
    secret="<<SECRET_HERE>>",
    response=False,
    report="useremail@domain.com"
)
print(validation_result)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

how2validate-0.0.1b7.tar.gz (3.0 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

how2validate-0.0.1b7-py3-none-any.whl (3.5 MB view details)

Uploaded Python 3

File details

Details for the file how2validate-0.0.1b7.tar.gz.

File metadata

  • Download URL: how2validate-0.0.1b7.tar.gz
  • Upload date:
  • Size: 3.0 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.2

File hashes

Hashes for how2validate-0.0.1b7.tar.gz
Algorithm Hash digest
SHA256 0cb6373d8bc4e6356f7f63b0b4059b301d762361e1b59ad967066443c0f15bef
MD5 c2ece825ad871a7b2414f29d212c508a
BLAKE2b-256 453a423788e88e6f070dfdc6b8bb648709a45305b7b434eb0f3078d8ecacbc97

See more details on using hashes here.

File details

Details for the file how2validate-0.0.1b7-py3-none-any.whl.

File metadata

  • Download URL: how2validate-0.0.1b7-py3-none-any.whl
  • Upload date:
  • Size: 3.5 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.2

File hashes

Hashes for how2validate-0.0.1b7-py3-none-any.whl
Algorithm Hash digest
SHA256 a41f48d5f7866858eed4874daa1d3d1fc5b8fab43ff7f0fd4a9da36a9029d43f
MD5 4f4abdfe39b90b59a1a4edf48e1be7fd
BLAKE2b-256 8000f6f07bd32e8c20795a9943c4712d46361af3a8283b3e7c81bb91f42413b8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page