Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec

    April 1, 2026

    Motorola is working on three new Edge 70 phones

    April 1, 2026

    Your TV is adding over 50ms of input lag unless you’ve enabled this one setting

    April 1, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Tech Gadgets»Researchers scan 10 million websites and uncover thousands of exposed API keys quietly granting access to cloud systems and critical infrastructure
    Researchers scan 10 million websites and uncover thousands of exposed API keys quietly granting access to cloud systems and critical infrastructure
    Tech Gadgets

    Researchers scan 10 million websites and uncover thousands of exposed API keys quietly granting access to cloud systems and critical infrastructure

    The Tech GuyBy The Tech GuyApril 1, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement




    • Thousands of exposed API keys quietly grant access to critical systems
    • Public webpages contain credentials that unlock cloud and payment services
    • Developers unknowingly leave sensitive API tokens embedded in live websites

    Security researchers from Stanford University, UC Davis, and TU Delft say sensitive API credentials are sitting openly on thousands of public webpages, with very little protection.

    Advertisement

    According to a preprint version of the study on arXiv, the researchers analyzed 10 million webpages and identified 1,748 valid credentials exposed across nearly 10,000 pages.

    These credentials cover cloud platforms, payment services, and developer tools used in production environments.

    Article continues below


    You may like

    Widespread exposure across everyday websites

    The issue cuts across both lesser-known sites and high-profile organizations, including cases tied to financial institutions and infrastructure-related services.

    Nurullah Demir, a PhD candidate at Stanford, said, “What we found were highly sensitive API credentials left publicly exposed on public webpages,” describing a pattern that suggests weak controls rather than isolated mistakes.

    These credentials function as access tokens that allow applications to interact directly with external systems.

    API credentials differ from standard login details because they enable automated and continuous access to services, often without additional verification layers.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Demir noted that such access can extend to databases, storage systems, and key management infrastructure depending on the permissions attached to each key.

    One example involved a major financial institution where cloud credentials were embedded in website code, creating direct exposure to internal services.

    In another case, repository credentials linked to firmware development were found exposed, raising the possibility of unauthorized code changes and distribution of altered updates.


    What to read next

    This expands the risk beyond data access into potential manipulation of software used in connected devices.

    The researchers traced most exposures to client-side code, especially JavaScript files delivered to users’ browsers.

    About 84% of the identified credentials appeared in JavaScript resources, with many originating from bundled files created by build tools such as Webpack.

    These processes can unintentionally include sensitive data when configurations are not tightly controlled.

    Other exposures were found in HTML and JSON files, while some appeared in less typical locations such as CSS.

    The spread across multiple file types suggests that the problem is embedded in how web assets are prepared and deployed rather than tied to a single development stage.

    The study also found that exposed credentials often remain accessible for long periods, ranging from several months to multiple years.

    Developers were frequently unaware of the issue until contacted, indicating gaps in monitoring and review processes.

    After disclosure efforts began, the number of exposed credentials dropped by roughly half within two weeks.

    The researchers caution that their findings likely represent only a lower bound, as they verified credentials from a limited set of service providers.

    That leaves open the possibility that far more credentials remain publicly accessible across the web without detection.


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.



    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    This case adds a Lightning port to the Apple iPhone 17 Pro

    April 1, 2026

    5 of the best new Android apps you need to try this April

    April 1, 2026

    My USB-C cables were constantly breaking until I started doing this

    April 1, 2026

    Bots officially overtake human users online as AI traffic explodes across commerce, search, streaming, and travel platforms

    March 31, 2026

    More Redmi Note 15 Special Edition details revealed: a different camera and battery

    March 31, 2026

    Walmart’s next Onn device could replace your ageing Chromecast with Google TV

    March 31, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec

    April 1, 2026

    Motorola is working on three new Edge 70 phones

    April 1, 2026

    Your TV is adding over 50ms of input lag unless you’ve enabled this one setting

    April 1, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.