• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Why Secrets in JavaScript Bundles are Still Being Missed

You are here: Home / General Cyber Security News / Why Secrets in JavaScript Bundles are Still Being Missed
January 20, 2026

Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed?

To find out, Intruder’s research team looked at what traditional vulnerability scanners actually cover and built a new secrets detection method to address gaps in existing approaches.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Applying this at scale by scanning 5 million applications revealed over 42,000 exposed tokens across 334 secret types, exposing a major class of leaked secrets that is not being handled well by existing tooling, particularly in single-page applications (SPAs).

In this article, we break down existing secrets detection methods and reveal what we found when we scanned millions of applications for secrets hidden in JavaScript bundles.

Established secrets detection methods (and their limitations)

Traditional secrets detection

The traditional, fully automated approach to detecting application secrets is to search a set of known paths and apply regular expressions to match known secret formats.

While this method is useful and can catch some exposures, it has clear limitations and will not detect all types of leaks, particularly those that require the scanner to spider the application or authenticate.

A good example of this is Nuclei’s GitLab personal access token template. The scanner is fed a base URL, for example, https://portal.intruder.io/, causing the template to:

  • Make an HTTP GET request to https://portal.intruder.io/
  • Inspect the direct response to that single request, ignoring other pages and resources such as JavaScript files
  • Attempt to identify the pattern of a GitLab personal access token
  • If found, make a follow-up request to GitLab’s public API to check whether the token is active
  • If active, raise an issue
  • This is clearly a simple example, but this approach is effective. Especially so when templates define many paths where secrets are commonly exposed.

    This format is typical of infrastructure scanners, which do not typically run a headless browser. When the scanner is given the base URL to scan (for example, https://portal.intruder.io), subsequent requests that would be made by a browser (such as the JavaScript files required to render the page, e.g., https://portal.intruder.io/assets/index-DzChsIZu.js) will not be made using this old-school approach.

    Dynamic Application Security Testing (DAST)

    Dynamic Application Security Testing (DAST) tools are generally a more robust way to scan applications, and tend to have more complex functionality, allowing for full spidering of applications, support for authentication, and a wider capability at detecting application layer weaknesses. Indeed, DAST scanners may seem the natural option for secrets detection in application front-ends. There should be nothing holding back a DAST scanner from discovering available JavaScript files or scanning for secrets within them.

    However, this type of scanning is more expensive, requires in-depth configuration, and in reality is usually reserved for a small number of high-value applications. For example, you are unlikely to configure a DAST scanner for every application you have out there across a wide digital estate. Plus, many DAST tools do not implement a wide enough range of regular expressions compared to well-known command-line tools.

    This leaves a clear gap which should be covered by the traditional infrastructure scanner, but isn’t – and in all likelihood is also not being covered by DAST scanners because of deployment, budget, and maintenance limitations.

    Static Application Security Testing (SAST)

    Static Application Security Testing (SAST) tools analyze source code to identify vulnerabilities and are a primary way to detect secrets before code reaches production. They are effective at catching hardcoded credentials and preventing some classes of exposure.

    However, we found that SAST methods also do not cover the full picture – and once again, some secrets within JavaScript bundles slipped through the gaps in a way that static analysis would miss.

    Building a secrets detection check for JavaScript bundles

    When we started this research, it was not clear how common this problem would be. Are secrets actually being bundled into JavaScript front-ends, and is it widespread enough to justify an automated approach?

    To find out, we built an automated check and scanned approximately 5 million applications. The result was a large number of exposures, significantly more than we expected. The output file alone was over 100MB of plain text and contained more than 42,000 tokens across 334 different secret types.

    We did not fully triage every result, but among the samples we reviewed, we identified a number of high-impact exposures.

    What we found

    Code Repository Tokens

    The most impactful exposures we identified were tokens for code repository platforms such as GitHub and GitLab. In total, we found 688 tokens, many of which were still active and gave full access to repositories.

    In one case, shown below, a GitLab personal access token was embedded directly in a JavaScript file. The token was scoped to allow access to all private repositories within the organization, including CI/CD pipeline secrets for onward services such as AWS and SSH.

    Project Management API Keys

    Another significant exposure involved an API key for Linear, a project management application, embedded directly in front-end code:

    The token exposed the organization’s entire Linear instance, including internal tickets, projects, and links to downstream services and SaaS projects.

    And more

    We identified exposed secrets across a wide range of other services, including:

    CAD software APIs – access to user data, project metadata, and building designs, including a hospital

    Link shorteners – ability to create and enumerate links

    Email platforms – access to mailing lists, campaigns, and subscriber data

    Webhooks for chat and automation platforms – 213 Slack, 2 Microsoft Teams, 1 Discord, and 98 Zapier, all of them active

    PDF converters – access to third-party document generation tools

    Sales intelligence and analytics platforms – access to scraped company and contact data

    Don’t ship your secrets

    Shift-left controls matter. SAST, repository scanning, and IDE guardrails catch real issues and prevent entire classes of exposure. But as this research shows, they do not cover every path a secret can take into production.

    Secrets introduced during build and deployment can bypass those safeguards and end up in front-end code, long after the point where shift-left controls have already run. And this problem will only grow as automation and AI-generated code become more common.

    That’s why single-page application spidering is needed to catch secrets before they reach production. We’ve built automated SPA secrets detection into Intruder so teams can actually catch this. Learn more.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


    Some parts of this article are sourced from:
    thehackernews.com

    Previous Post: «tudou guarantee marketplace halts telegram transactions after processing over $12 Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Why Secrets in JavaScript Bundles are Still Being Missed
    • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
    • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
    • ⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
    • DevOps & SaaS Downtime: The High (and Hidden) Costs for Cloud-First Businesses
    • New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
    • CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures
    • Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations
    • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
    • OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans

    Copyright © TheCyberSecurity.News, All Rights Reserved.