Skip to content

fix: improve detector unit test data for kraken, netsuite, viewneo#4831

Open
raajheshkannaa wants to merge 2 commits intotrufflesecurity:mainfrom
raajheshkannaa:fix/detector-unit-tests
Open

fix: improve detector unit test data for kraken, netsuite, viewneo#4831
raajheshkannaa wants to merge 2 commits intotrufflesecurity:mainfrom
raajheshkannaa:fix/detector-unit-tests

Conversation

@raajheshkannaa
Copy link
Copy Markdown

@raajheshkannaa raajheshkannaa commented Mar 24, 2026

Closes #3817 (partial)

Summary

Addresses three detectors explicitly cited in the issue where test data was reverse-engineered from regex patterns rather than matching real credential formats:

  • kraken: Replaced invalid base64 test strings (with = padding mid-string) with properly encoded keys matching real Kraken API format
  • netsuite: Used realistic sandbox account ID format, added documentation comments explaining TBA credential structure
  • viewneo: Replaced opaque blob with structured JWT-like token (header.payload.signature), fixed invalid pattern placement

Test plan

  • go test ./pkg/detectors/kraken/... passes
  • go test ./pkg/detectors/netsuite/... passes
  • go test ./pkg/detectors/viewneo/... passes
  • Test data now resembles real credential formats rather than regex artifacts

Note

Low Risk
Test-only updates that adjust fixture strings and input formats; low risk beyond potential for tightening/loosening detector expectations and causing unintended test coverage gaps.

Overview
Updates unit test fixtures for kraken, netsuite, and viewneo detectors to use more realistic credential formats and to better align with each detector’s prefix/regex boundaries.

kraken tests now use valid base64-like API key/secret samples (with correct padding behavior) and config-style input; netsuite uses realistic TBA credential components and sandbox account ID plus clearer invalid-character cases; viewneo replaces the opaque blob with a JWT-like header.payload.signature token and refines invalid/duplicate test inputs accordingly.

Written by Cursor Bugbot for commit e61541f. This will update automatically on new commits. Configure here.

Replace reverse-engineered, nonsensical test data with realistic
credential formats that actually validate detector accuracy.

- kraken: Use valid base64-encoded API key and private key instead of
  strings with = padding in the middle (invalid base64)
- netsuite: Add comments explaining TBA credential format, use realistic
  account ID (TSTDRV sandbox prefix), reorganize test vars for clarity
- viewneo: Replace opaque blob with structured JWT-like token
  (header.payload.signature), fix invalid pattern to actually break the
  regex match instead of just changing position 0

Closes trufflesecurity#3817 (partial)
@raajheshkannaa raajheshkannaa requested a review from a team March 24, 2026 00:28
@raajheshkannaa raajheshkannaa requested a review from a team as a code owner March 24, 2026 00:28
@CLAassistant
Copy link
Copy Markdown

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

Copy link
Copy Markdown

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Fix broken & inaccurate detector unit tests

2 participants