From cf06540a092d1c8c195758b7e9f73486c64d5fde Mon Sep 17 00:00:00 2001 From: blupants Date: Tue, 16 Jul 2024 22:20:14 -0500 Subject: [PATCH] Added Slack support to README.md --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index a9ad832..4d76412 100644 --- a/README.md +++ b/README.md @@ -11,7 +11,7 @@ # n0s1 - Secret Scanner -n0s1 ([pronunciation](https://en.wiktionary.org/wiki/nosy#Pronunciation)) is a secret scanner for Jira, Confluence, Asana, Wrike and Linear.app. It scans all tickets/items/issues within the chosen platform in search of any leaked secrets in the titles, bodies, and comments. It is open-source and it can be easily extended to support scanning many others Project Management and Issue Tracker platforms. +n0s1 ([pronunciation](https://en.wiktionary.org/wiki/nosy#Pronunciation)) is a secret scanner for Slack, Jira, Confluence, Asana, Wrike and Linear. It scans all channels/tickets/items/issues within the chosen platform in search of any leaked secrets in the titles, bodies, messages and comments. It is open-source and it can be easily extended to support scanning many others ticketing and messaging platforms. These secrets are identified by comparing them against an adaptable configuration file named [regex.yaml](https://github.com/spark1security/n0s1/blob/main/src/n0s1/config/regex.yaml). Alternative TOML format is also supported: [regex.toml](https://github.com/spark1security/n0s1/blob/main/src/n0s1/config/regex.toml). The scanner specifically looks for sensitive information, which includes: * Github Personal Access Tokens @@ -23,6 +23,7 @@ These secrets are identified by comparing them against an adaptable configuratio * npm access tokens ### Currently supported target platforms: +* [Slack](https://slack.com) * [Jira](https://www.atlassian.com/software/jira) * [Confluence](https://www.atlassian.com/software/confluence) * [Asana](https://asana.com)