Latest Socket ResearchMalicious Chrome Extension Performs Hidden Affiliate Hijacking.Details
Socket
Book a DemoInstallSign in
Socket

@secretlint/secretlint-rule-database-connection-string

Package Overview
Dependencies
Maintainers
2
Versions
14
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@secretlint/secretlint-rule-database-connection-string

A secretlint rule for database-connection-string

latest
Source
npmnpm
Version
11.3.1
Version published
Weekly downloads
550
-20.98%
Maintainers
2
Weekly downloads
 
Created
Source

@secretlint/secretlint-rule-database-connection-string

A Secretlint rule to detect hardcoded passwords in database connection strings for MongoDB, MySQL, and PostgreSQL.

This rule detects URI format database connection strings that contain hardcoded credentials for MongoDB, MySQL, and PostgreSQL.

Install

Install with npm:

npm install @secretlint/secretlint-rule-database-connection-string

MessageIDs

MongoDBConnection

Report when hardcoded credentials are found in MongoDB connection strings.

Detects:

  • Standard URI format: mongodb://user:password@host:port/database
  • MongoDB Atlas SRV format: mongodb+srv://user:password@cluster.mongodb.net/database
  • Connection strings within quoted strings and environment variable assignments

Good:

const uri = "mongodb://localhost:27017/mydb";
const uri = "mongodb://username:${PASSWORD}@host:27017/mydb";
const uri = "mongodb://username:REPLACE_WITH_PASSWORD@localhost:27017/mydb";  // placeholder
const uri = "mongodb+srv://user:{password}@cluster.mongodb.net/test";

Bad:

const uri = "mongodb://user:s3cr3tP4ss@cluster.mongodb.net/mydb";
MONGO_URI="mongodb://admin:realP@ssw0rd@cluster.mongodb.net/production";
mongodb+srv://app:c0mpl3xPwd@cluster0.mongodb.net/mydb?retryWrites=true;

MySQLConnection

Report when hardcoded credentials are found in MySQL connection strings.

Detects:

  • URI format: mysql://user:password@host:port/database
  • JDBC format: jdbc:mysql://user:password@host:port/database
  • X DevAPI format: mysqlx://user:password@host:port/database

Good:

const uri = "mysql://localhost:3306/mydb";
const uri = "mysql://user:${PASSWORD}@host:3306/mydb";
const uri = "mysql://user:REPLACE_WITH_PASSWORD@localhost:3306/mydb";  // placeholder

Bad:

const uri = "mysql://user:hardcodedpass@db.example.com:3306/mydb";
const jdbc = "jdbc:mysql://admin:s3cr3tPwd@db.company.com:3306/app";

PostgreSQLConnection

Report when hardcoded credentials are found in PostgreSQL connection strings.

Detects:

  • URI format: postgresql://user:password@host:port/database
  • Alternative URI format: postgres://user:password@host:port/database

Good:

const uri = "postgresql://localhost:5432/mydb";
const uri = "postgres://user:${PASSWORD}@host:5432/mydb";
const uri = "postgres://user:REPLACE_WITH_PASSWORD@localhost:5432/mydb";  // placeholder

Bad:

const uri = "postgres://user:secretpass@db.example.com:5432/mydb";
create_engine('postgresql://postgres:c0mpl3xPwd@host:5432/mydb')

Options

  • allows: string[]

False Positive Prevention

This rule includes several mechanisms to prevent false positives:

  • Variable Pattern Detection: Automatically ignores common variable patterns like ${PASSWORD}, {password}, {{username}}
  • Placeholder Detection: Skips common placeholder values like password, username, YOUR_PASSWORD, etc.
  • Entropy Analysis: Uses entropy calculation to distinguish real passwords from simple placeholder text
  • Minimum Length: Requires passwords to be at least 4 characters long to reduce noise

Example patterns that are ignored:

mongodb://username:password@localhost:27017/database
mysql://user:${PASSWORD}@host:3306/db
postgresql://{username}:{password}@host:5432/db

Changelog

See Releases page.

Running tests

No Test to avoid Dependency cycles.

Contributing

Pull requests and stars are always welcome.

For bugs and feature requests, please create an issue.

  • Fork it!
  • Create your feature branch: git checkout -b my-new-feature
  • Commit your changes: git commit -am 'Add some feature'
  • Push to the branch: git push origin my-new-feature
  • Submit a pull request :D

License

MIT © azu

Keywords

secretlint

FAQs

Package last updated on 28 Jan 2026

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts