insecure-source-code-management
Installation
SKILL.md
SKILL: Insecure Source Code Management
AI LOAD INSTRUCTION: This skill covers detection and recovery of exposed version-control metadata, common backup artifacts, and related misconfigurations. Use only in authorized assessments. Treat recovered credentials and URLs as sensitive; do not exfiltrate real data beyond scope. For broad discovery workflow, cross-load recon-for-sec and recon-and-methodology when those skills exist in the workspace.
0. QUICK START
High-value paths to probe first (GET or HEAD, respect rate limits):
/.git/HEAD
/.git/config
/.svn/entries
/.svn/wc.db
/.hg/requires
/.bzr/README
/.DS_Store
/.env
中文路由提示:快速扫这些路径;若需完整侦察流程,从 recon-for-sec、recon-and-methodology 技能载入方法论后再深入。
1. GIT EXPOSURE
Detection
/.git/HEAD— valid repo often returns plain text like:
ref: refs/heads/main
/.git/config— may exposeremote.origin.url, user identity, or embedded credentials./.git/index,/.git/objects/— partial object store access enables reconstruction with the right tools.
403 vs 404
404— path likely absent or fully blocked at the edge.403on/.git/— directory may exist but listing is denied; still try direct file URLs:
/.git/HEAD
/.git/config
/.git/logs/HEAD
/.git/refs/heads/main
A 403 on the directory plus 200 on HEAD strongly indicates exposure.
Recovery tools (open source)
arthaud/git-dumper— dumps reachable.gittree when individual files are fetchable.internetwache/GitTools— Dumper, Extractor, Finder modules for partial/corrupt dumps.WangYihang/GitHacker— alternative recovery when standard dumpers miss edge cases.
Key files to prioritize
| Path | Why it matters |
|---|---|
.git/config |
Remotes, credentials, hooks paths |
.git/logs/HEAD |
Commit history, reflog-style leakage |
.git/refs/heads/* |
Branch tips, commit SHAs |
.git/packed-refs |
Packed branch/tag refs |
.git/objects/** |
Object blobs for reconstruction |
2. SVN EXPOSURE
Detection
- SVN before 1.7:
/.svn/entries— XML or text metadata listing paths and revisions. - SVN ≥ 1.7:
/.svn/wc.db— SQLite working copy database (PRAGMA table_infoafter download).
Example probe:
GET /.svn/entries HTTP/1.1
GET /.svn/wc.db HTTP/1.1
Recovery
anantshri/svn-extractor— automated extraction from exposed.svn.- Manual: download
wc.db, query withsqlite3for file paths and checksums, then request/.svn/pristine/blobs if exposed.
3. MERCURIAL EXPOSURE
Detection
/.hg/requires— small text file listing repository features; confirms Mercurial metadata.
GET /.hg/requires HTTP/1.1
GET /.hg/store/ HTTP/1.1
Recovery
sahildhar/mercurial_source_code_dumper— dumps repository when store paths are reachable.
4. OTHER LEAKS
Bazaar (Bzr)
- Probe
/.bzr/READMEand/.bzr/branch-formatfor Bazaar metadata.
macOS .DS_Store
/.DS_Storecan encode directory and filename listings.- Tools:
gehaxelt/ds-store,lijiejie/ds_store_exp— parse.DS_Storeoffline.
Backup and config artifacts
Probe (adjust for app root and naming conventions):
/.env
/backup.zip
/backup.tar.gz
/wwwroot.rar
/backup.sql
/config.php.bak
/.config.php.swp
Web server misconfiguration signal (example: NGINX)
location /.git { deny all; }— may return 403 for/.git/while still allowing or denying specific subpaths depending on rules.- 403 on a protected location can confirm the route exists; always distinguish from 404 on non-existent paths.
5. DECISION TREE
- Probe
/.git/HEAD→ref: refs/heads/pattern? → run git-dumper / GitTools / GitHacker; reviewconfigandlogs/HEADfor secrets. - Else probe
/.svn/wc.dborentries→ success? → svn-extractor or manualwc.db+ pristine recovery. - Else probe
/.hg/requires→ success? → mercurial dumper. - Else probe
/.bzr/README→ Bazaar tooling or manual path walk. - Parallel: fetch
/.DS_Store,/.env, common backup extensions on app root and parent paths. - Interpret status codes: 403 on directory + 200 on specific files → treat as high priority for file-by-file extraction.
6. RELATED ROUTING
- From recon-for-sec — scope-safe discovery, crawling, and fingerprinting before deep VCS tests.
- From recon-and-methodology — structured methodology and evidence handling.
中文:与侦察类技能联动——先定范围与速率,再针对 VCS/备份做定向验证。
Weekly Installs
47
Repository
yaklang/hack-skillsGitHub Stars
69
First Seen
1 day ago
Security Audits
Installed on
cursor47
gemini-cli47
deepagents47
antigravity47
github-copilot47
amp47