Skip to content

Travis CI API Test

ID: api-travisci

Severity: info

Author: zzeitlin

Tags: token-spray,travis

id: api-travisci
info:
name: Travis CI API Test
author: zzeitlin
severity: info
reference:
- https://developer.travis-ci.com/
metadata:
max-request: 1
tags: token-spray,travis
self-contained: true
http:
- method: GET
path:
- "https://api.travis-ci.com/user"
headers:
Travis-API-Version: 3
Authorization: token {{token}}
matchers:
- type: status
status:
- 403
negative: true
# digest: 4b0a00483046022100dc87f5ef2a4981a05df03fb46f4281f7da5198ba3ada9879da7df105a92f3ef0022100be98e242442c7427ca62ea2c1b8a2aeba47841a3f0da532b86e61c887ba2a02d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/token-spray/api-travisci.yaml"

View on Github