Sensitive Data: Exposed JWT Token¶
Identifier:
exposed_jwt
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
JWTs should not contain sensitive information in their payload as they are only base64 encoded and can be easily decoded by anyone, potentially leading to data breaches and privacy violations.
How we test: We analyze JWT tokens found in requests and responses to detect if sensitive data such as passwords, personal information, or secrets are stored in JWT claims. We decode JWT payloads and check for common sensitive data patterns that should not be exposed in tokens.
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.