Skip to content

LinkedIn Secret Key

ID: linkedin-secret-key

Severity: info

Author: DhiyaneshDK

Tags: linkedin,exposure,tokens

id: linkedin-secret-key
info:
name: LinkedIn Secret Key
author: DhiyaneshDK
severity: info
reference:
- https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/builtin/rules/linkedin.yml
- https://docs.microsoft.com/en-us/linkedin/shared/api-guide/best-practices/secure-applications
metadata:
verified: true
max-request: 1
tags: linkedin,exposure,tokens
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- (?i)linkedin.?(?:api|app|application|client|consumer|customer|secret|key).?(?:key|oauth|sec|secret)?.{0,2}\s{0,20}.{0,2}\s{0,20}.{0,2}\b([a-z0-9]{16})\b
# digest: 4a0a0047304502210094b2c85869e869d2ed5d02f176910214c858850d8210b0a4a0bc510895e103a402207b14c23b3405c5db0aea98a8571cbb254eca85347eebc93a53cfa77d0ac00269:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/linkedin/linkedin-secret-key.yaml"

View on Github