Information Disclosure: AWS Docker Config Exposure¶
Identifier:
aws_docker_config_exposure
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
When AWS Docker configuration files aren't properly secured, they can be accessible to anyone online, potentially revealing sensitive settings like credentials, endpoints, or service details that could allow attackers to compromise Docker containers or AWS resources.
How we test: We scan for exposed AWS Docker configuration files such as Dockerrun.aws.json and analyze responses to detect if sensitive configuration details, credentials, or service information are accessible via web servers.
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.