{"id":6726,"date":"2026-01-20T12:11:43","date_gmt":"2026-01-20T12:11:43","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/20\/why-secrets-in-javascript-bundles-are-still-being-missed\/"},"modified":"2026-01-20T12:11:43","modified_gmt":"2026-01-20T12:11:43","slug":"why-secrets-in-javascript-bundles-are-still-being-missed","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/20\/why-secrets-in-javascript-bundles-are-still-being-missed\/","title":{"rendered":"Why Secrets in JavaScript Bundles are Still Being Missed"},"content":{"rendered":"<p>\u200bLeaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed?<br \/>\nTo find out, Intruder\u2019s research team looked at what traditional vulnerability scanners actually cover and built a new secrets detection method to address gaps in existing approaches.\u00a0<br \/>\nApplying this at scale by scanning 5 million applications revealed over\u00a0Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed?<br \/>\nTo find out, Intruder\u2019s research team looked at what traditional vulnerability scanners actually cover and built a new secrets detection method to address gaps in existing approaches.\u00a0<br \/>\nApplying this at scale by scanning 5 million applications revealed over\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bLeaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed? To find out, Intruder\u2019s research team looked at what traditional vulnerability scanners actually cover and built a new secrets detection method to address gaps in existing approaches.\u00a0 Applying this at scale by&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/20\/why-secrets-in-javascript-bundles-are-still-being-missed\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Why Secrets in JavaScript Bundles are Still Being Missed<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6727,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6726"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6726"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6726\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6727"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}