Scan for Sensitive Files
Scan for exposed sensitive files that may leak sensitive information
Category
Vulnerability Scanning
Inputs
urls
file
requiredList of URLs
header
string
Header(s) to include in HTTP requests
rate-limit
string
Maximum number of requests to send per second per machine
header-file
file
Header(s) to include in HTTP requests
Outputs
findings
Features
Scan for Sensitive Files
Description
Scan for exposed files that may leak sensitive information, including logs, configuration files, and development artifacts.
Features
- Scans for a wide range of sensitive files.
- Validates the content to minimize false positives.
- Can scan thousands of web servers simulataneously.
Inputs
Required
- urls: a list of URLs
https://foo.example.com
https://bar.example.com
https://bar.example.com/app
Optional
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- findings: JSONLines records of finding details.
{"finding": "Git Configuration", "location": "https://foo.example.com/.git/config", "severity": "medium", "hostname": "foo.example.com", "domain_name": "example.com", "ip_address": "1.2.3.4", "method": "GET", "description": "Git configuration was detected via the pattern /.git/config and log file on passed URLs"}
{"finding": "AWS Credentials", "location": "https://bar.example.com/app/.aws/credentials", "severity": "high", "hostname": "bar.example.com", "domain_name": "example.com", "ip_address": "5.6.7.8", "method": "GET", "description": "AWS credentials found via /.aws/credentials endpoint"}
Changelog
- v1.0.0
- Initial release
- v1.1.0
- Added
header-file
input
- Added