risks / Code discovery
Description
Allows an attacker to inventory source code repositories or files.
Risk: MEDIUM
Exploited in isolation, this risk has the potential to create operational burden or monetary costs, or access organizational secrets.
Mitigations
- (No mitigations for this risk)
Links
- (No links for this risk)
Affected Privileges
An attacker may be able to exploit this risk if they gain any of the following privileges:
© 2023–present P0 Security and contributors to the IAM Privilege Catalog