id: azure-pipelines-exposed info: name: Azure Pipelines Configuration File Disclosure author: DhiyaneshDk severity: medium tags: config,exposure,azure metadata: shodan-query: html:"azure-pipelines.yml" requests: - method: GET path: - "{{BaseURL}}/.azure-pipelines.yml" - "{{BaseURL}}/azure-pipelines.yml" stop-at-first-match: true matchers-condition: and matchers: - type: word words: - "trigger:" - "pool:" - "variables:" condition: and - type: status status: - 200