Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add OPSEC leak disclaimer when using active features #59

Open
Maijin opened this issue Oct 23, 2020 · 3 comments
Open

Add OPSEC leak disclaimer when using active features #59

Maijin opened this issue Oct 23, 2020 · 3 comments
Assignees
Labels
Useful Fix QoL improvements, improves something already functioning without changing the output

Comments

@Maijin
Copy link

Maijin commented Oct 23, 2020

What is the feature that you are requesting?
Some features used in the tool can leak information to attackers and open source intelligence such as the scan to URLscan.
Therefore the tool should provide a one-shot disclaimer and a disclaimer likely in the README.

I would also suggest adding the passive alternative of scan -> search.

Additional information

Scanning on URLscan can lead to expose sensitive documents, sessions. It can also tip attacker that a specific campaign and even a specific email address is valid, information that they can use in a more advanced campaign.

Example 1
Example 2 via j_opdenakker

@TheresAFewConors TheresAFewConors linked a pull request Oct 25, 2020 that will close this issue
3 tasks
@TheresAFewConors TheresAFewConors self-assigned this Oct 25, 2020
@TheresAFewConors TheresAFewConors added the Useful Fix QoL improvements, improves something already functioning without changing the output label Oct 25, 2020
@TheresAFewConors
Copy link
Owner

Hi Maijin,

There's an open PR that sets the URLScan option to private instead to address this issue. The other options currently do not push by default to the various tools.

I've assigned the PR to this issue.

Thanks for raising it.

@Maijin
Copy link
Author

Maijin commented Oct 25, 2020

Yep that's a good progress, but don't forget that private or public scan more than the URLScan.io public listing, both will also reach-out to attacker infrastructure therefore tipping the attacker about their on-going campaign/valid email address etc.

So I'd still leave a disclaimer for the first scan and likely the README.md for that feature.

@jenetiks
Copy link
Contributor

jenetiks commented May 7, 2021

I can take a look at adding this in over the weekend! What would you think of providing the URLscan privacy policy instead? Something like:

"May want to check this out before submitting: [link]"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Useful Fix QoL improvements, improves something already functioning without changing the output
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants