# detect-secrets exclusion patterns (regex) # # Note: detect-secrets does not read this file by default. If you want these # applied, wire them into your scan command (e.g. translate to --exclude-files # / --exclude-lines) or into a baseline's filters_used. [exclude-files] # pnpm lockfiles contain lots of high-entropy package integrity blobs. pattern = (^|/)pnpm-lock\.yaml$ [exclude-lines] # Fastlane checks for private key marker; not a real key. pattern = key_content\.include\?\("BEGIN PRIVATE KEY"\) # UI label string for Anthropic auth mode. pattern = case \.apiKeyEnv: "API key \(env var\)" # CodingKeys mapping uses apiKey literal. pattern = case apikey = "apiKey" # Schema labels referencing password fields (not actual secrets). pattern = "gateway\.remote\.password" pattern = "gateway\.auth\.password" # Schema label for talk API key (label text only). pattern = "talk\.apiKey" # checking for typeof is not something we care about. pattern = === "string" # specific optional-chaining password check that didn't match the line above. pattern = typeof remote\?\.password === "string" # Docker apt signing key fingerprint constant; not a secret. pattern = OPENCLAW_DOCKER_GPG_FINGERPRINT= # Credential matrix metadata field in docs JSON; not a secret value. pattern = "secretShape": "(secret_input|sibling_ref)" # Docs line describing API key rotation knobs; not a credential. pattern = API key rotation \(provider-specific\): set `\*_API_KEYS` # Docs line describing remote password precedence; not a credential. pattern = passw[o]rd: `OPENCLAW_GATEWAY_PASSW[O]RD` -> `gateway\.auth\.passw[o]rd` -> `gateway\.remote\.passw[o]rd` pattern = passw[o]rd: `OPENCLAW_GATEWAY_PASSW[O]RD` -> `gateway\.remote\.passw[o]rd` -> `gateway\.auth\.passw[o]rd` # Test fixture starts a multiline fake private key; detector should ignore the header line. pattern = const key = `-----BEGIN PRIVATE KEY----- # Docs examples: literal placeholder API key snippets and shell heredoc helper. pattern = export CUSTOM_API_K[E]Y="your-key" pattern = grep -q 'N[O]DE_COMPILE_CACHE=/var/tmp/openclaw-compile-cache' ~/.bashrc \|\| cat >> ~/.bashrc <<'EOF' pattern = env: \{ MISTRAL_API_K[E]Y: "sk-\.\.\." \}, pattern = "ap[i]Key": "xxxxx", pattern = ap[i]Key: "A[I]za\.\.\.", # Sparkle appcast signatures are release metadata, not credentials. pattern = sparkle:edSignature="[A-Za-z0-9+/=]+"