Generic Database Credentials in URL

Detects Generic Database Credentials in URL patterns. Matches user:password@host in any protocol URL

Type
regex
Engine
universal
Confidence
high
Confidence justification
High confidence: structurally constrained pattern with corroborative keyword support reduces false positive rates significantly. Added context gating and exclusion rules improve precision and reduce incidental matches.
Jurisdictions
global
Regulations
Criminal Code Act 1995 (Cth)
Frameworks
CIS Controls, ISO 27001, NIST CSF, PCI-DSS, SOC 2
Data categories
credentials, security
Scope
wide
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Compatible, Netskope: Compatible

Pattern

[a-zA-Z]+://[^/:@]+:[^/:@]+@\s{1,100}

Corroborative evidence keywords

api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more)

Proximity: 300 characters

Should match

Should not match

Known false positives