leakz-passive-workflow
leakz-passive-workflow copied to clipboard
Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.
Leakz
Leakz is Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.
Install
- Download the workflow file via releases page or:
wget https://github.com/dwisiswant0/leakz/raw/master/dist/Leakz.json. - In Caido, navigate to Testing > Workflows, then Import the workflow file.
— or
- Just execute:
bun run workflow:install. - After that, refresh your Caido instance by right-clicking and selecting Reload.
[!TIP] To update, you must first uninstall it using
bun run workflow:uninstall, and then reinstall it to apply the changes, or simply executebun run workflow:update.
That's it!
[!IMPORTANT] Response interception needs to be enabled for this passive workflow to work properly.
Development
[!NOTE] Bun toolkit is required.
- Build (bundled) the sources:
bun run build. - Compile into Caido workflow:
bun run compile.
Caveats
Currently, I understand that it's challenging to selectively opt-in or out of certain kinds of leaks and/or to exclude specific patterns while maintaining good UX.
By default, Leakz does NOT scan for PII & sensitive fields; you can configure this in the config.ts file and then rebuild and compile the source to apply them.
Limitations
~Leakz currently does not offer scanning for leaks in request/response headers. See https://github.com/caido/caido/issues/972.~
License
The patterns is curated from mazen160/secrets-patterns-db.
Leakz is released with ♡ by @dwisiswant0 under the Apache 2.0 license. See LICENSE.