Skip to content

Security Test: Data leak

Description

Default Severity:

When an API accidentally makes up its mind to share secrets, it's like leaving your house keys on the front door—attackers can easily find them and misuse them. Developers often inadvertently embed sensitive details, like private keys, tokens, or passwords, into their code and then forget to hide or remove them from the public part of the API. This vulnerability is dangerous because it lets malicious actors gain unauthorized access, potentially taking over systems or stealing data. Being careful with how and where sensitive information is stored can help avoid these high-stake slip-ups.

Reference:

Configuration

Identifier: information_disclosure/data_leak

Examples

All configuration available:

checks:
  information_disclosure/data_leak:
    skip: false # default
    options:
      blacklist: # cf. Options below

Options

Options can be set in the options key of the Security Test Configuration.

Property Type Default Description
blacklist List[string] List of elements to ignore.

Compliance and Standards

Standard Value
OWASP API Top 10 API1:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 6.5.3
GDPR Article-32
SOC2 CC1
PSD2 Article-95
ISO 27001 A.18.1
NIST SP800-53
FedRAMP AC-4
CWE 200
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
CVSS Score 7.2