Information Disclosure - Suspicious Comments
ID |
information_disclosure_suspicious_comments |
Severity |
info |
Kind |
Information Disclosure |
CWE |
615 |
Description
The response appears to contain suspicious comments which may help an attacker. The detector identifies HTML, JavaScript, or CSS comments that contain TODO markers, developer notes, credentials, API keys, internal URLs, debugging statements, or technical implementation details that should not be exposed to clients.
Rationale
Comments left in production code can reveal internal system architecture, unfinished features, known bugs, test credentials, or planned security measures. An attacker scanning response bodies can extract this metadata to identify vulnerabilities, understand authentication flows, locate admin interfaces, or discover deprecated endpoints that may lack proper security controls. Comments describing workarounds or temporary fixes often point directly to exploitable weaknesses.