- Documentation: https://docs.oracle.com/en/database/oracle/oracle-database/index.html
- Summary: Oracle database is a multi-model database management system. This detector aims at finding Oracle credentials in the form of URI connection strings.
- IPs allowlist: This can be implemented on the server side.
- Scopes: Oracle DB supports Role Based Access Control. Users can thus be granted with different access ranges. Here is a more detailed documentation on this topic.
Primary administrators of the database can revoke and manage users' credentials. Users can also change their own password using command line tools.
Database access logs can be stored and audited on the server side to investigate suspicious activities.
Category: Data storage
High recall: True
Validity check available: False
Minimum number of matches: 8
Occurrences found for one million commits: 0.17
- type: FilenameBanlistPreValidator banlist_extensions:  banlist_filenames:  check_binaries: false include_default_banlist_extensions: true- type: ContentWhitelistPreValidator patterns: - oracle
- text: > CONNECTION_URI="oracle://root:firstname.lastname@example.org:5434/thegift" host: google.com port: "5434" username: root password: m42ploz2wd scheme: oracle database: thegift connection_uri: oracle://root:email@example.com:5434/thegift # Test special characters in password- text: > CONNECTION_URI="oracle://root:m42p!o@firstname.lastname@example.org:5434/thegift" host: google.com port: "5434" username: root password: m42p!o@2wd scheme: oracle database: thegift connection_uri: oracle://root:m42p!o@email@example.com:5434/thegift