SiteShadow
Back to vulnerability library

CWE-313 Cleartext Storage in a File or on Disk

What this means

SiteShadow flagged sensitive information being written to files on disk in plaintext (logs, exports, caches, temp files, backups).

Why it matters

Cleartext files are easy to copy and exfiltrate.

Safer examples

1) Don't write secrets to disk

Keep secrets in a secret manager and inject at runtime; avoid dumping configs with secrets.

2) Use strict permissions and protected locations

Write to application-owned directories and set restrictive permissions.

3) Encrypt sensitive exports

If you must export sensitive data, encrypt the output and control key distribution.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage