Skip to content

Protocol: Header leak

Identifier: header_leak

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

When a web server gives away details about its inner workings in its HTTP headers, it offers a roadmap for attackers. Essentially, key information like which server or framework is in use can inadvertently help hackers target known weaknesses in those technologies. Developers often overlook default settings that automatically include this data or forget to remove it during deployment, which can leave the application more vulnerable to tailored attacks if an issue arises later on.

References:

Configuration

Example

Example configuration:

---
security_tests:
  header_leak:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.