Skip to content

Start analyzing file contents for potentially sensitive information. #9

@Broham

Description

@Broham

Initially I'm thinking we should look for these values:

pass
pw
pwd
passwd
key
user
username
secret

Once we have analyzed a number of files we can go back and see which terms are actually finding vulnerabilities.

Metadata

Metadata

Assignees

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions