You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: connection.yml.sample
+9Lines changed: 9 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -61,3 +61,12 @@ sources:
61
61
- private
62
62
- venv
63
63
- node_modules
64
+
65
+
slack:
66
+
slack_example:
67
+
token: xoxp-XXXXXXXXXXXXXXXXXXXXXXXXX # get your slack app these permissiosn https://api.slack.com/methods/team.info and https://api.slack.com/methods/conversations.list
HAWK Eye is a powerful and versatile CLI (Command-Line Interface) tool designed to be your vigilant watchkeeper, guarding against potential data breaches and cyber threats across various platforms. Inspired by the precision and vision of majestic birds of prey, HAWK Eye swiftly scans multiple data sources, including S3, MySQL, PostgreSQL, MongoDB, Redis, Firebase, filesystem, and Google Cloud buckets (GCS), for Personally Identifiable Information (PII) and secrets.
20
+
HAWK Eye is a powerful and versatile CLI (Command-Line Interface) tool designed to be your vigilant watchkeeper, guarding against potential data breaches and cyber threats across various platforms. Inspired by the precision and vision of majestic birds of prey, HAWK Eye swiftly scans multiple data sources, including S3, MySQL, PostgreSQL, MongoDB, Slack, Redis, Firebase, filesystem, Slack, and Google Cloud buckets (GCS), for Personally Identifiable Information (PII) and secrets.
21
21
22
22
23
23
### Why "HAWK Eye"?
@@ -127,6 +127,11 @@ Note: If you don't provide any command, it will run all commands (firebase, fs,
127
127
mongodb
128
128
<td>Scan MongoDB profiles for PII and secrets data.</td>
129
129
</tr>
130
+
<tr>
131
+
<td>
132
+
slack
133
+
<td>Scan slack profiles for PII and secrets data.</td>
134
+
</tr>
130
135
<tr>
131
136
<td>
132
137
postgresql
@@ -246,6 +251,16 @@ sources:
246
251
- .docx
247
252
- venv
248
253
- node_modules
254
+
255
+
slack:
256
+
slack_example:
257
+
token: xoxp-XXXXXXXXXXXXXXXXXXXXXXXXX # get your slack app these permissiosn https://api.slack.com/methods/team.info and https://api.slack.com/methods/conversations.list
258
+
channel_types: "public_channel,private_channel"
259
+
# Optional: List of channel names to check
260
+
# channel_names:
261
+
# - general
262
+
# - random
263
+
249
264
```
250
265
251
266
You can add or remove profiles from the connection.yml file as needed. You can also configure only one or two data sources if you don't need to scan all of them.
Copy file name to clipboardExpand all lines: setup.py
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@
11
11
setup(
12
12
name='hawk_scanner',
13
13
version=VERSION,
14
-
description='A powerful scanner to scan your Filesystem, S3, MongoDB, MySQL, PostgreSQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.',
14
+
description='A powerful scanner to scan your Filesystem, S3, MongoDB, MySQL, PostgreSQL, Redis, Slack, Google Cloud Storage and Firebase storage for PII and sensitive data.',
0 commit comments