You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
we could be more refined when choosing candidates for secrets. Typically only key=value patterns should be leaked secrets. But we also have others, such as private keys, that do not follow this pattern. So we only detect based on the regex now, and additionally detects if we have a key value, but is not needed.
We really should be better interpreting the context of the code, and not only the regexes
Describe the issue
There is false positive detected by the Dogecoin regex (
Dogecoin: \b(D|A)[a-km-zA-HJ-NP-Z1-9]{25,34}\b
)The import code snippet, is matched by the regex, in particular this import
AddProviderEndpointRequest
Steps to Reproduce
try to add
AddProviderEndpointRequest
in the code and ask for a reviewOperating System
MacOS (Arm)
IDE and Version
Vsocde 1.96.4
Extension and Version
continue
Provider
vLLM
Model
deepseek
Codegate version
0.1.17
Logs
No response
Additional Context
The text was updated successfully, but these errors were encountered: