Storage & Bucket Exposure
Storage & Bucket Exposure scans HTML and JavaScript responses for cloud storage URLs, including:
- Amazon S3 (
*.s3.amazonaws.com) - Google Cloud Storage (
storage.googleapis.com/...) - Azure Blob Storage (
*.blob.core.windows.net) - DigitalOcean Spaces (
*.digitaloceanspaces.com)
For each discovered endpoint, the module can probe basic accessibility to understand if:
- The bucket or endpoint is public-readable.
- Access is denied or restricted.
- The asset surface is larger than expected.
This is helpful for:
- Detecting unintentionally exposed storage buckets.
- Mapping data-storage dependencies for a web property.
- Feeding storage endpoints into more detailed cloud security reviews.
For request format, parameters, and examples, see the Endpoint page in this module.
Last updated on