id: gcloud-credentials info: name: Google Cloud Credentials author: DhiyaneshDK severity: medium description: Google Cloud Crdentials file is exposed. metadata: verified: true max-request: 2 shodan-query: html:"credentials.db" tags: google,cloud,devops,exposure,files http: - method: GET path: - "{{BaseURL}}/credentials.db" - "{{BaseURL}}/.config/gcloud/credentials.db" stop-at-first-match: true matchers-condition: and matchers: - type: word words: - 'SQLite' - 'client_id' condition: and - type: word part: header words: - 'application/octet-stream' - type: status status: - 200 # digest: 4b0a00483046022100e07ad12627e2af190412929e4442940560a8a9f8001b85db959bea9d2c58bcf4022100e943836f36c5400939c6d4d36b9c30e55fa626974c5d8cdda5b7e9d6d7c279f3:922c64590222798bb761d5b6d8e72950