Private key exposure via helper detector
Searches for private key exposure by attempting to query the helper endpoint on node_modules
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
5 sec
Scan only one
Url
Toolbox
-
A remote attacker can exploit this to gain access to the system.
![cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.](/_next/image?url=%2Fassets%2Fimages%2Fhome%2Fshield-256.png&w=640&q=75)
Try it yourself,
control security posture
control security posture