Recently, I built StatusScout, an open-source tool to check and monitor a website’s health. For testing purposes, I ran the tool against hundreds of websites. Here are the most common security issues I encountered:

1. Sensitive files or directories are publicly available

A surprisingly large number of websites have sensitive files and directories accessible via the web. The ten most common ones I encountered are:

/.htaccess – could reveal sensitive server rules

/info.php or /test.php – usually expose phpinfo() output, which can reveal detailed server and PHP configuration that could be abused

/package-lock.json – exposes JavaScript dependencies and project structure. This is especially dangerous if it includes outdated packages with…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help