Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsWhy Secrets in JavaScript Bundles Are Still Being Missed
Why Secrets in JavaScript Bundles Are Still Being Missed
Cybersecurity

Why Secrets in JavaScript Bundles Are Still Being Missed

•January 20, 2026
0
The Hacker News
The Hacker News•Jan 20, 2026

Companies Mentioned

Intruder

Intruder

GitHub

GitHub

GitLab

GitLab

GTLB

Linear

Linear

Slack

Slack

WORK

Microsoft

Microsoft

MSFT

Discord

Discord

Zapier

Zapier

Amazon

Amazon

AMZN

Why It Matters

Leaked front‑end tokens grant attackers immediate access to code repositories, CI pipelines, and internal services, creating a high‑impact breach vector. Closing this hidden attack surface is essential for securing modern web applications.

Key Takeaways

  • •42k tokens found in 5M apps
  • •334 secret types across JavaScript bundles
  • •Traditional scanners miss secrets in SPA assets
  • •Active repo tokens expose full code repositories
  • •Automated SPA scanning now integrated in Intruder

Pulse Analysis

The rise of single‑page applications has shifted much of the runtime logic into client‑side JavaScript bundles. While developers focus on protecting server‑side credentials, the build process often injects tokens directly into these bundles, making them publicly downloadable. Traditional shift‑left controls such as SAST or repository scans stop short of the final artifact, leaving a blind spot that attackers can exploit simply by fetching a .js file. As browsers automatically request these assets, any embedded secret becomes instantly exposed to anyone with network access.

Intruder’s research team addressed this blind spot by constructing a scanner that crawls SPAs, renders pages in a headless browser, and parses every JavaScript payload for known secret patterns. Applied to roughly five million applications, the tool extracted more than 100 MB of raw findings, revealing over 42 000 tokens across 334 distinct secret categories. High‑impact leaks included 688 active GitHub/GitLab personal‑access tokens, Linear project‑management keys, and dozens of active Slack, Teams, and Zapier webhooks. The breadth of exposed services demonstrates that bundling secrets is not an isolated mistake but a systemic issue.

Enterprises must extend their security testing beyond source code to the final bundle that reaches users. Automated SPA spidering, combined with comprehensive regex libraries, can surface hidden credentials before deployment. Intruder has now integrated this capability into its platform, enabling continuous monitoring of front‑end assets and rapid remediation of exposed tokens. As AI‑generated code and CI/CD pipelines accelerate, the likelihood of accidental secret inclusion will rise, making proactive bundle inspection a critical component of a modern DevSecOps strategy.

Why Secrets in JavaScript Bundles are Still Being Missed

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...