Skip to content

Security Test: Appspec Exposure

Description

Default Severity:

This vulnerability happens when critical configuration files become publicly accessible. Essentially, sensitive information like deployment settings and secrets can accidentally be exposed if these YAML files aren’t properly restricted. Developers might leave these files in public directories or forget to limit access, which gives attackers a straightforward way to find and misuse important details about the deployment process. The risk is significant since it can lead to unauthorized access, misconfigurations, and a deeper compromise of the system if other components rely on the exposed data.

Configuration

Identifier: information_disclosure/appspec_exposure

Examples

All configuration available:

checks:
  information_disclosure/appspec_exposure:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API8:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 2.2.5
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.12.6
NIST SP800-123
FedRAMP AC-22
CWE 200
CVSS Vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N