SYM_GEN_0068 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of Hard-coded Credentials

Property Value
Language generic
Severity medium
CWE CWE-798: Use of Hard-coded Credentials
OWASP A07:2021 - Identification and Authentication Failures
Confidence Level Low
Impact Level High
Likelihood Level Low

Description

A secret is hard-coded in the application. Secrets stored in source code, such as credentials, identifiers, and other types of sensitive data, can be leaked and used by internal or external malicious actors. It is recommended to rotate the secret and retrieve them from a secure secret vault or Hardware Security Module (HSM), alternatively environment variables can be used if allowed by your company policy.