Techniques
Sample rules
Potential Secret Scanning via Gitleaks
- source: elastic
- technicques:
- T1003
- T1555
Description
This rule detects the execution of Gitleaks, a tool used to search for high-entropy strings and secrets in code repositories, which may indicate an attempt to access credentials.
Detection logic
process where event.type == "start" and event.action like ("exec", "exec_event", "start", "ProcessRollup2", "executed", "process_started", "Process Create*") and
process.name : ("gitleaks.exe", "gitleaks")