Skip to content

Consider Filtering Discovered Secrets from Future HTTP Data #2

Open
@joeleonjr

Description

@joeleonjr

The extension executes TruffleHog every 10 seconds. TruffleHog will cache across each individual execution but not across executions. As a result, the same secret might be sent for verification every 10 seconds (if it appears consistently in HTTP traffic). This could cause unintended side effects due to rate limiting, fraud & abuse detection engineering, and account lockout policies.

A couple options:

  • String replace raw secret values from HTTP data. This would probably work well in 99% of cases, but I'm sure there are edge cases where doing this will alter data to the point where we will miss a new secret.
  • Add a cache tied to each Burp Suite session.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions