NEVER commit real API keys to the repository! This project includes multiple layers of protection:
- GitHub Secret Scanning: Automatically detects and blocks pushes containing secrets
- Gitleaks: Scans commits for sensitive data patterns
- Pre-commit Hooks: Client-side scanning before commits
- CI/CD Security Scanning: Multi-tool scanning in GitHub Actions
-
Use Environment Variables:
export VIRUSTOTAL_API_KEY="your_real_key_here"
-
Use Local Properties Files (gitignored):
# In local.properties (automatically ignored) VirusTotal.apiKey=your_real_key_here
-
GitHub Secrets for CI/CD:
- Go to repository Settings β Secrets and variables β Actions
- Add
VIRUSTOTAL_API_KEYas a repository secret - Use in workflows:
${{ secrets.VIRUSTOTAL_API_KEY }}
- β Never put API keys directly in code
- β Never commit
.envfiles with real keys - β Never put keys in commit messages
- β Never put keys in pull request descriptions
- β Never put keys in issue comments
Our test files use obviously fake keys:
// GOOD: Clearly fake test patterns
String testApiKey = "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef";
String testKey = "ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789";# Install pre-commit (requires Python)
pip install pre-commit
# Install the hooks
pre-commit install
# Run manually
pre-commit run --all-files# Run Gitleaks
gitleaks detect --source . --verbose
# Run detect-secrets
detect-secrets scan --baseline .secrets.baselineIf you discover a security vulnerability:
- DO NOT open a public issue
- Email security concerns to: [rileyporter@gmail.com]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- API keys stored securely in user preferences
- Rate limiting to prevent API abuse
- No API keys logged or exposed in error messages
- Secure HTTPS communication only
- Safe decompilation of Java bytecode
- No execution of analyzed code
- Sandboxed analysis environment
- Hash-based file identification (SHA-256)
This project follows:
- OWASP Top 10 security guidelines
- GitHub security best practices
- Java security coding standards
- Secure API integration patterns
Security Team: ril3y Email: rileyporter@gmail.com GPG Key: Available on request
Last Updated: September 2024 Security Policy Version: 1.0