Information Disclosure: Exposed Config File¶
Identifier:
exposed_config_file
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
JavaScript configuration objects exposed on the window object may reveal sensitive information such as API endpoints, authentication tokens, feature flags, internal service URLs, and other configuration details that attackers can access through browser DevTools.
How we test: We analyze client-side JavaScript code and page sources to detect if configuration objects are exposed on the window object (e.g., window.config, window.env, window.settings). We check for sensitive data such as API keys, tokens, or internal URLs that should not be exposed to client-side code.
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.