Get Started
- CodeAnt AI
- Control Center
- Pull Request Review
- IDE
- Compliance
- Anti-Patterns
- Code Governance
- Infrastructure Security Database
- Application Security Database
- Apex
- Bash
- C
- Clojure
- Cpp
- Csharp
- Dockerfile
- Elixir
- Lang
- Phoenix
- Security
- Action-reuse-csrf
- Cross-site-websocket-hijacking
- Hardcoded-secrets
- Hsts-not-enabled
- Https-not-enabled
- Missing-csp
- Missing-csrf-protections
- Missing-secure-browser-headers
- Fingerprints
- Generic
- Go
- Html
- Java
- Javascript
- Json
- Kotlin
- Ocaml
- Php
- Problem-based-packs
- Python
- Ruby
- Rust
- Scala
- Solidity
- Swift
- Terraform
- Typescript
- Yaml
Hardcoded-secrets
Hardcoded secrets
In the event of a source-code disclosure via file read vulnerability, accidental commit, etc, hard-coded secrets may be exposed to an attacker. This may result in database access, cookie forgery, and other issues. This rule detects missing hard-coded secrets by checking the prod configuration.
Likelihood: LOW
Confidence: HIGH
CWE:
- CWE-798: Use of Hard-coded Credentials
OWASP:
- A05:2021 - Security Misconfiguration