logo

Database

Config Files Ssh Private Key

Description

The source code repository contains sensitive information: SSH Private Key

Weakness:

385 - Non-encrypted confidential information - Keys

Category: Information Collection

Detection Strategy

    Matches SSH Private Key patterns in source code and configuration files

Vulnerable code example

-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAAbmV3bGluZXMAAAAA
-----BEGIN OPENSSH PRIVATE KEY-----
    b3BlbnNzaC1rZXktdjEAAAAAbmV3bGluZXMAAAAA