SiteShadow
Back to vulnerability library

CWE-922 Insecure Storage of Sensitive Information

What this means

SiteShadow flagged sensitive data being stored in a way that's easier to extract than intended (plaintext on disk, secrets in config files, tokens cached without protection, sensitive exports left in shared locations).

Why it matters

Insecure storage can expose secrets or regulated data.

Safer examples

1) Keep secrets out of the repo and out of disk where possible

Use environment injection or a secret manager; avoid writing tokens/keys to local files (see S01 / CWE-798).

2) Encrypt sensitive data at rest when you must store it

Use a vetted library and keys from KMS/secret manager; avoid "homebrew" crypto (see CWE-1240).

3) Lock down storage locations and lifecycle

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage