Thank you for taking your time to contribute to this project, we appreciate it a lot 🎉
The following document contains several guidelines that you should follow when contributing to this project. If you believe the guidelines require alteration please propose your own changes too via a Pull Request!
- Please follow the format below to help speed up the process of reviewing PRs
🟢Additions:
- Add [`rule-name-lowercase`](<COMMIT_URL>)
🟠Changes:
- Add rule condition to [`rule-name-lowercase`](<COMMIT_URL>)
🔴Removals:
- Remove [`rule-name-lowercase`](<COMMIT_URL>)
- Use the present tense
- Reference related issues & pull requests in the description (if applicable)
- Limit the title to 60 characters at most
- It is advised to prepend the following emojis to the start of a commit message:
- 💎
:gem:
when changing underlying IOK code - 💡
:bulb:
when updating dependencies - ✂️
:scissors:
when removing dependencies - ✨
:sparkles:
when modifying an IOK rule - 🚀
:rocket:
when creating a new IOK rule - 📦
:package:
when modifying the CI workflows - 📌
:pushpin:
when modifying the guidelines outlined in this file (CONTRIBUTING.md
) - 📜
:scroll:
when modifying the README
- 💎
-
Titles must follow the format of:
<context> Phishing Kit <unique_id>
context
is either the brand or process being imitated (e.g.Facebook Account Recovery
)unique_id
can be generated from a random assortment of8
alphanumeric characters in the ranges of[0-9]
and[a-f]
(e.g.0e420f8e
) and must be written in lowercase
-
Descriptions must at the least accurately describe what the rule detects (e.g.
Detects a Facebook phishing kit, telling the victim to enter their details to reactivate their account.
) -
References must include between to
2
to5
unique URLScan URLs which refer to the same kit -
All detection fields must follow camel casing (e.g.
camelCase
) -
Tags must include the targeted company/brand OR technique(s) used, and at the very least should include targeted country (if applicable) and any other tags that you deem to be sufficient (eg.
kit
,target.facebook
,target_country.germany
,threat_actor.kimsuky
)
Rule Structure:
title:
description:
references:
[related:]
detection:
fieldName:
condition:
tags:
NOTICE: Descriptions do in fact support markdown rendering, when being displayed on the rule's dedicated page on the PhishReport website here