logo

Database

Description

Storing IP addresses in code can be a security-sensitive issue, as this can result in an attacker discovering a potentially sensitive address or network segment.

Impact

Get sensitive information or private secrets.

Recommendation

- Load sensitive data from safe sources such as, key vault services, configuration files properly encrypted or administrative environment variables.

Threat

Attacker with access to the source-code from the Internet.

Expected Remediation Time

⏱️ 30 minutes.

Fixes