id: gcloud-credentials info: name: Google Cloud Credentials author: DhiyaneshDK severity: medium description: Google Cloud Crdentials file is exposed. metadata: verified: true max-request: 2 shodan-query: html:"credentials.db" tags: google,cloud,devops,exposure,files http: - method: GET path: - "{{BaseURL}}/credentials.db" - "{{BaseURL}}/.config/gcloud/credentials.db" stop-at-first-match: true matchers-condition: and matchers: - type: word words: - 'SQLite' - 'client_id' condition: and - type: word part: header words: - 'application/octet-stream' - type: status status: - 200 # digest: 4a0a00473045022028113ef84b121e12a99a4b7756962b849bbf7f081122d79f092c9675b1cf07e0022100fe3984aac9f7eabbe8f6bc705af9d524f84b2446e57ced7fd213f2017eeafd78:922c64590222798bb761d5b6d8e72950