Skip to Content
Research with Our Labs
ReconnaissanceStorage Bucket ExposureStorage & Bucket Exposure – Summary

Storage & Bucket Exposure

Storage & Bucket Exposure scans HTML and JavaScript responses for cloud storage URLs, including:

  • Amazon S3 (*.s3.amazonaws.com)
  • Google Cloud Storage (storage.googleapis.com/...)
  • Azure Blob Storage (*.blob.core.windows.net)
  • DigitalOcean Spaces (*.digitaloceanspaces.com)

For each discovered endpoint, the module can probe basic accessibility to understand if:

  • The bucket or endpoint is public-readable.
  • Access is denied or restricted.
  • The asset surface is larger than expected.

This is helpful for:

  • Detecting unintentionally exposed storage buckets.
  • Mapping data-storage dependencies for a web property.
  • Feeding storage endpoints into more detailed cloud security reviews.

For request format, parameters, and examples, see the Endpoint page in this module.

Last updated on