Skip to content

Asana Client Secret

ID: asana-client-secret

Severity: info

Author: DhiyaneshDK

Tags: asana,exposure,tokens,secret

id: asana-client-secret
info:
name: Asana Client Secret
author: DhiyaneshDK
severity: info
reference:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/asana-client-secret.go
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/asana-client-secret.yaml
metadata:
verified: true
max-request: 1
tags: asana,exposure,tokens,secret
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- (?i)(?:asana)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:=|\|\|:|<=|=>|:)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
# digest: 4a0a0047304502205b0b8d981fbe0df78c33fc7593a3d9cba466c7d95c450dcc148cf7f2f0953574022100cc48247748393ca03a460854c02890aed5127a2dea64d28be544a8e8cb0dd2b0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/asana/asana-client-secret.yaml"

View on Github