PayloadsAllTheThings/API Key Leaks
2024-11-18 18:26:58 +01:00
..
Files UnPAC The Hash + MachineKeys.txt 2021-10-26 21:56:39 +02:00
IIS-Machine-Keys.md Normalize page header for API, CSPT, CORS, CSRF 2024-11-09 23:01:39 +01:00
README.md API Key rework 2024-11-18 18:26:58 +01:00

API Key and Token Leaks

API keys and tokens are forms of authentication commonly used to manage permissions and access to both public and private services. Leaking these sensitive pieces of data can lead to unauthorized access, compromised security, and potential data breaches.

Summary

Tools

Methodology

  • API Keys: Unique identifiers used to authenticate requests associated with your project or application.
  • Tokens: Security tokens (like OAuth tokens) that grant access to protected resources.

Common Causes of Leaks

  • Hardcoding in Source Code: Developers may unintentionally leave API keys or tokens directly in the source code.

    # Example of hardcoded API key
    api_key = "1234567890abcdef"
    
  • Public Repositories: Accidentally committing sensitive keys and tokens to publicly accessible version control systems like GitHub.

    ## Scan a Github Organization
    docker run --rm -it -v "$PWD:/pwd" trufflesecurity/trufflehog:latest github --org=trufflesecurity
    
    ## Scan a GitHub Repository, its Issues and Pull Requests
    docker run --rm -it -v "$PWD:/pwd" trufflesecurity/trufflehog:latest github --repo https://github.com/trufflesecurity/test_keys --issue-comments --pr-comments
    
  • Hardcoding in Docker Images: API keys and credentials might be hardcoded in Docker images hosted on DockerHub or private registries.

    # Scan a Docker image for verified secrets
    docker run --rm -it -v "$PWD:/pwd" trufflesecurity/trufflehog:latest docker --image trufflesecurity/secrets
    
  • Logs and Debug Information: Keys and tokens might be inadvertently logged or printed during debugging processes.

  • Configuration Files: Including keys and tokens in publicly accessible configuration files (e.g., .env files, config.json, settings.py, or .aws/credentials.).

Validate The API Key

If assistance is needed in identifying the service that generated the token, mazen160/secrets-patterns-db can be consulted. It is the largest open-source database for detecting secrets, API keys, passwords, tokens, and more. This database contains regex patterns for various secrets.

patterns:
  - pattern:
      name: AWS API Gateway
      regex: '[0-9a-z]+.execute-api.[0-9a-z._-]+.amazonaws.com'
      confidence: low
  - pattern:
      name: AWS API Key
      regex: AKIA[0-9A-Z]{16}
      confidence: high

Use streaak/keyhacks or read the documentation of the service to find a quick way to verify the validity of an API key.

  • Example: Telegram Bot API Token

    curl https://api.telegram.org/bot<TOKEN>/getMe
    

References