Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: e__)) jinja2_env = jinja2.Environment( loader=jinja2.FileSystemLoader(template_path) ) APP_ID = aap_identity.get_application_id() CLOUDSQL_INSTANCE = '{}:{}'.format(APP_ID, MY-INSTANCE-NAME) DATABASE_NAME = 'guestbook' USER_NAME = A-SECRET-USERNAME PASSWORD = A-SECRET-PASSWORD def get_connection(): if os.environ['SERVER_SOFTWARE'].startswith('Development/'): return rdbms.connect(instance=CLOUDSQL_INSTANCE, database=DATABASE_NAME) else: return rdbms.connect(instance=CLOUDSQL_INSTANCE, database=DATABASE_NAME Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: e__)) jinja2_env = jinja2.Environment( loader=jinja2.FileSystemLoader(template_path) ) APP_ID = aap_identity.get_application_id() CLOUDSQL_INSTANCE = […]

Viewing all articles
Browse latest Browse all 2834

Trending Articles