Scan for Exposed Secrets
Scan HTTP responses for exposed tokens, credentials, and other sensitive information
Category
Vulnerability Scanning
Inputs
urls
file
requiredList of URLs
header
string
Header(s) to include in HTTP requests
rate-limit
string
Maximum number of requests to send per second per machine
header-file
file
Header(s) to include in HTTP requests
Outputs
findings
Scan for Exposed Secrets
Description
Scan HTTP responses for exposed tokens, credentials, and other sensitive information.
Features
- Scans for a wide range of secret patterns.
- Reuses HTTP responses across searches to minimize outgoing requests.
- Can scan thousands of URLs simulataneously.
Inputs
Required
- urls: a list of URLs
Optional
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- findings: JSONLines records of finding details.
Changelog
- v1.0.0
- Initial release
- v1.1.0
- Added
header-file
input
- Added
- v1.2.0
- Added recursive scanning to detect vulnerabilities at every level of the input URL paths