Secrets & Data Leaks Detection
Data leaks often stem from hardcoded credentials, misconfigured access controls, or unencrypted data flows. This category covers vulnerabilities leading to the exposure of Personally Identifiable Information (PII), API keys, and enterprise secrets across modern software supply chains.
How does Precogs AI detect PII and hardcoded secrets?
Static regex rules often miss obfuscated secrets or produce massive false positives. Precogs AI uses AI-powered entropy analysis and contextual comprehension to detect 100+ secret types (from AWS keys to GCP service accounts) across source code, raw binaries, and CI/CD pipelines with high fidelity.
Vulnerability Types
CWE-522
HIGHInsufficiently Protected Credentials
Credentials stored with weak protection mechanisms — weak hashing (MD5, SHA-1 without salt), insufficient access control...
CWE-538
HIGHInsertion of Sensitive Information into Externally-Accessible File or Directory
Storing secrets, credentials, or PII in files accessible via web server (public directories, git repos, backup files, .e...
CWE-540
HIGHInclusion of Sensitive Information in Source Code
Embedding internal URLs, infrastructure details, or employee information in source code comments or string literals that...
CWE-615
HIGHInclusion of Sensitive Information in Source Code Comments
Developers leaving passwords, TODO notes with credentials, internal API endpoints, or database connection strings in cod...
CWE-327-PII
HIGHWeak Cryptography Protecting PII
Using deprecated algorithms (MD5, SHA-1, DES) to encrypt or hash PII, making the data vulnerable to brute-force attacks ...
CWE-1004
HIGHSensitive Cookie Without HttpOnly Flag
Session cookies and authentication tokens set without HttpOnly flag, making them accessible to JavaScript and vulnerable...
CWE-614
HIGHSensitive Cookie in HTTPS Session Without Secure Attribute
Authentication cookies transmitted over HTTPS that lack the Secure flag, allowing them to be sent over unencrypted HTTP ...
CWE-548
HIGHExposure of Information Through Directory Listing
Web servers configured to display directory listings that expose file names, backup files, configuration files, and pote...
Recently Discovered in Secrets & Data Leaks
Browse the latest vulnerabilities and exposures dynamically tracked to the Secrets & Data Leaks domain.
Detect Secrets & Data Leaks Vulnerabilities Automatically
Precogs AI scans your code and binaries for Secrets & Data Leaks vulnerabilities and generates AutoFix PRs — no manual review needed.