OAuth client secrets

Identifies oauth client secrets patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems.

Type
regex
Engine
boost_regex
Confidence
medium
Confidence justification
category-aware structural regex with anchor and context constraints replaces phrase-only detection.
Detection quality
Mixed
Jurisdictions
global
Regulations
Criminal Code Act 1995 (Cth), NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth)
Frameworks
CIS Controls, DISP, ISO 27001, NIST CSF, PCI-DSS, SOC 2
Data categories
credentials, security
Scope
wide
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Degraded, Netskope: Unsupported

Pattern

(?is)\b(?:oauth\s+client\s+secrets|client\s+secret|client\s+id|authorization\s+code|access\s+token|refresh\s+token|bearer\s+token|grant\s+type|redirect\s+uri|openid\s+connect)\b

Corroborative evidence keywords

oauth client secrets, oauth, client, secrets, credentials, keys, OFFICIAL, OFFICIAL:Sensitive, PROTECTED, SECRET, TOP SECRET, CABINET-IN-CONFIDENCE, NOFORN, REL TO, ORCON, National Cabinet, AUSTEO, AGAO, Sensitive: Legal, Sensitive: Personal Privacy (+30 more)

Proximity: 300 characters

Should match

Should not match

Known false positives