Private key exposure via helper detector
Searches for private key exposure by attempting to query the helper endpoint on node_modules
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
5 second
Time Interval
4 day
Scan only one
Url
Toolbox
-
A remote attacker can exploit this to gain access to the system.