Skip to content

Linkedin Client ID

ID: linkedin-id

Severity: low

Author: gaurang

Tags: file,keys,token,linkedin

id: linkedin-id
info:
name: Linkedin Client ID
author: gaurang
severity: low
tags: file,keys,token,linkedin
file:
- extensions:
- all
extractors:
- type: regex
regex:
- "(?i)linkedin(.{0,20})?(?-i)[0-9a-z]{12}"
# digest: 490a00463044022059835992c5ee87ad6d29b9bd657727bf0747250cd74bc1e3cc8f2ff15de7afa0022073953c688af5b12bfcc0dfb8a115aef8757a12698ca64ed7eea8eb0bfb611a3a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/keys/linkedin-id.yaml"

View on Github