id: gcloud-access-token info: name: Google Cloud Access Token author: DhiyaneshDK severity: medium description: Internal Google Cloud access tokens are exposed. metadata: verified: true max-request: 2 shodan-query: html:"access_tokens.db" tags: google,cloud,devops,exposure,files http: - method: GET path: - "{{BaseURL}}/access_tokens.db" - "{{BaseURL}}/.config/gcloud/access_tokens.db" stop-at-first-match: true matchers-condition: and matchers: - type: word words: - 'SQLite' - 'access_token' condition: and - type: word part: header words: - 'application/octet-stream' - type: status status: - 200 # digest: 4a0a00473045022100a6d738687332dd375d95d1d9c1b1d0903752c21687a2d21f613df3f31d42708d0220129074bee84175fe19af7e04a00d8fb0fe3148efb2b3b1687ef0e58429345ce3:922c64590222798bb761d5b6d8e72950