Skip to content

Confluent Secret Key

ID: confluent-secretkey

Severity: info

Author: DhiyaneshDK

Tags: confluent,exposure,tokens

id: confluent-secretkey
info:
name: Confluent Secret Key
author: DhiyaneshDK
severity: info
reference:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/confluent-secret-key.yaml
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/confluent-secret-key.go
metadata:
verified: true
max-request: 1
tags: confluent,exposure,tokens
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- (?i)(?:confluent)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:=|\|\|:|<=|=>|:)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
# digest: 4a0a0047304502206af0b79846538f48de250d26ccd894594416739e7204a232ce9c84909c3bc3fd0221009ff56bf505570b178819b1c62b65bb2be369d440ebc1cef0e2dfd9badfe9d3aa:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/confluent/confluent-secretkey.yaml"

View on Github