Enterprise News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Enterprise Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
EnterpriseNewsWhat 5 Million Apps Revealed About Secrets in JavaScript
What 5 Million Apps Revealed About Secrets in JavaScript
CybersecurityEnterpriseDefense

What 5 Million Apps Revealed About Secrets in JavaScript

•February 17, 2026
0
BleepingComputer
BleepingComputer•Feb 17, 2026

Why It Matters

Front‑end secret exposure bypasses conventional security controls, leaving organizations vulnerable to data breaches and supply‑chain attacks. The findings force a rethink of how developers and security teams protect single‑page applications.

Key Takeaways

  • •42,000 secrets uncovered across 5M JavaScript bundles.
  • •688 active repository tokens exposed, including full‑access GitLab PATs.
  • •Traditional scanners miss secrets embedded in front‑end assets.
  • •SPA spidering essential for comprehensive secret detection.
  • •Build‑time leaks bypass SAST and DAST controls.

Pulse Analysis

The scale of JavaScript‑embedded credentials uncovered by Intruder’s research is unprecedented. By crawling five million applications, the team generated a 100 MB dump of plain‑text tokens, exposing everything from repository access keys to Slack webhooks. These findings underscore that front‑end code is no longer a low‑risk surface; it now carries the same credential‑leakage potential as back‑end services, especially as developers increasingly bundle third‑party SDKs and AI‑generated snippets.

Why existing tools falter is rooted in their design assumptions. Traditional regex‑based scanners inspect only the initial HTTP response, ignoring the cascade of assets a browser loads. SAST tools stop at source repositories, missing secrets injected during the build pipeline, while DAST solutions often lack the breadth of patterns needed for secret detection and are too costly to run on every SPA. Consequently, critical tokens slip into production unnoticed, creating a hidden attack vector that can be weaponized for repository hijacking, credential stuffing, or lateral movement across cloud environments.

Mitigating this risk requires a shift‑left approach that extends to the final JavaScript bundle. Automated SPA spidering, combined with dedicated secret‑detection engines, can surface embedded credentials before they reach users. Organizations should integrate such tooling into CI/CD pipelines, enforce IDE guardrails, and regularly audit deployed bundles. As automation and AI‑generated code proliferate, the attack surface will expand, making proactive front‑end security a non‑negotiable component of modern DevSecOps.

What 5 Million Apps Revealed About Secrets in JavaScript

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...