Raxx · internal docs

internal · gated ↑ index

RCA — gitleaks false-positive fires nightly on Cloudflare Account ID

Incident ID: 2026-05-01-gitleaks-cf-account-id-false-positive Date: 2026-05-01 Severity: SEV-4 (infrastructure drift / toil accumulating; no secrets exposed) Duration: ~24h between first filing (2026-04-30 nightly scan) and resolution (2026-05-01) Blast radius: nightly security scan noise; #682 filed; would continue filing duplicate issues on every subsequent nightly run without remediation Author: sre-agent

Summary

The nightly gitleaks scan filed #682 (CRITICAL: generic-api-key in terraform/freescout/terraform.tfvars:31) daily. The flagged value is the Cloudflare Account ID — a public identifier, not a secret. An allowlist entry for this pattern already existed in .gitleaks.toml (added in PR #633), but the allowlist was silently not working because regexTarget = "match" was not set, causing gitleaks to test the regex against the bare hex Secret value rather than the full variable-assignment Match string. PR #839 adds regexTarget = "match" and two additional SOP path suppressions; full-history scan drops from 19 findings to 0.

Timeline (all times UTC)

Impact

What went well

What didn't go well

Root cause analysis

Detection

Resolution

Action items

# Action Owner Due Issue
1 Merge PR #839 — gitleaks allowlist fix Kristerpher 2026-05-02 #839
2 Add CI job that runs gitleaks full-history scan on PRs touching .gitleaks.toml and fails on new findings sre-agent 2026-05-08 (new)
3 Add note to .gitleaks.toml header: "when adding a regexes entry, test with gitleaks detect --no-git=false" sre-agent 2026-05-08 (in PR #839 comment)

References