Secrets & Data Leaks Detection
Data leaks often stem from hardcoded credentials, misconfigured access controls, or unencrypted data flows. This category covers vulnerabilities leading to the exposure of Personally Identifiable Information (PII), API keys, and enterprise secrets across modern software supply chains.
How does Precogs AI detect PII and hardcoded secrets?
Static regex rules often miss obfuscated secrets or produce massive false positives. Precogs AI uses AI-powered entropy analysis and contextual comprehension to detect 100+ secret types (from AWS keys to GCP service accounts) across source code, raw binaries, and CI/CD pipelines with high fidelity.
Vulnerability Types
CWE-798
HIGHHardcoded Credentials
Embedding usernames, passwords, API keys, or tokens directly in source code or compiled binaries. One of the most common...
CWE-312
HIGHCleartext Storage of Sensitive Information
Storing passwords, PII, financial data, or health records in plaintext in databases, files, logs, or environment variabl...
CWE-532
HIGHInsertion of Sensitive Information into Log File
Logging PII, credentials, session tokens, or financial data to application logs, where it may be exposed to unauthorized...
CWE-200
HIGHExposure of Sensitive Information to an Unauthorized Actor
Unintentional disclosure of PII, internal system details, or credentials through error messages, API responses, debug ou...
CWE-321
HIGHUse of Hard-coded Cryptographic Key
Embedding encryption keys, signing keys, or TLS certificates directly in source code or firmware. Attackers who obtain t...
CWE-359
HIGHExposure of Private Personal Information
Application handles PII (names, SSN, health records, financial data) without proper access controls, anonymization, or c...
CWE-256
HIGHPlaintext Storage of a Password
Storing user passwords in plaintext or reversible encryption in databases, configuration files, or application state, en...
CWE-257
HIGHStoring Passwords in a Recoverable Format
Using reversible encryption (AES, Base64) instead of one-way hashing for password storage. If the encryption key is leak...
CWE-311
HIGHMissing Encryption of Sensitive Data
Transmitting or storing sensitive data (PII, financial records, health data) without encryption, violating compliance re...
CWE-319
HIGHCleartext Transmission of Sensitive Information
Sending credentials, PII, or payment data over HTTP, unencrypted MQTT, or raw TCP connections where network sniffers can...
Recently Discovered in Secrets & Data Leaks
Browse the latest vulnerabilities and exposures dynamically tracked to the Secrets & Data Leaks domain.
Detect Secrets & Data Leaks Vulnerabilities Automatically
Precogs AI scans your code and binaries for Secrets & Data Leaks vulnerabilities and generates AutoFix PRs — no manual review needed.