Hardcoded URL

ID

url

Severity

info

Vendor

-

Family

url

Description

This detector finds hardcoded URLs in the source code.

Security

A URL could contain sensitive information. If this is the case, the attacker could use this for malicious purposes.

Examples

https://domain.example.com?param=sensitive_information

Mitigation / Fix

  1. Remove the URL from the source code or committed file.

  2. Follow your policy for handling leaked secrets, which typically require revoking the secret in the target system(s).

  3. If under a git repository, you may remove unwanted files from the repository history using tools like git filter-repo or BFG Repo-Cleaner. You may follow the procedure listed here for GitHub.

You should consider any sensitive data in commits with secrets as compromised.

Remember that secrets may be removed from history in your projects, but not in other users' cloned or forked repositories.

  1. Check access logs to ensure that the secret was not used by unintended actors during the compromised period.