diff --git a/generic/secrets/security/detected-aws-access-key-id-value.yaml b/generic/secrets/security/detected-aws-access-key-id-value.yaml index ac22dc9780..1553b5d872 100644 --- a/generic/secrets/security/detected-aws-access-key-id-value.yaml +++ b/generic/secrets/security/detected-aws-access-key-id-value.yaml @@ -1,7 +1,7 @@ rules: - id: detected-aws-access-key-id-value patterns: - - pattern-regex: (A3T[A-Z0-9]|AKIA|AGPA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16} + - pattern-regex: \b(A3T[A-Z0-9]|AKIA|AGPA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}\b - pattern-not-regex: (?i)example|sample|test|fake languages: [regex] message: AWS Access Key ID Value detected. This is a sensitive credential and should not be hardcoded