DEV Community

Abhinav Singwal
Abhinav Singwal

Posted on

Finding 100+ Public Log Files & SQL Dumps: What It Taught Me About Security

While exploring websites for security issues, I came across something interesting over 100 publicly accessible log files and database-related files available online.

At first, it looked like a serious problem. But as I analyzed it further, it turned into an important learning experience about how security issues are evaluated in the real world.


What I Found

Using basic techniques to collect website links, I discovered multiple pages where files were openly accessible without any login.

These files included:

  • Log files (records of system activity)
  • Database structure files
  • Debug and error reports

What Kind of Information Was Visible?

When I checked these files, I found different types of information that should normally stay private:

1. Session Information

Some files contained session IDs, which are used to keep users logged in.


2. Internal Links

There were internal service URLs that show how the system communicates behind the scenes.


3. API Keys and Identifiers

Some entries showed keys and IDs used by applications to connect with services.


4. Personal Information

A few logs included usernames, email addresses, and system-related details.


5. System Details

The files revealed:

  • Folder paths from computers
  • Software versions
  • Internal configurations

6. Debug Information

Some logs showed development-related details like:

  • Debug ports
  • Internal code references
  • Build information

Why This Can Be Risky

Even if this data cannot be directly used to hack a system, it can still help attackers in several ways:

  • Understand how a system works internally
  • Identify weak points
  • Prepare more targeted attacks
  • Use exposed information for scams or social engineering

The Most Important Lesson

At first, it seemed obvious that this was a major security issue.

But the key question is:

Who made this data public?

There are two possibilities:

  1. The platform accidentally exposed it (a real security issue)
  2. Users uploaded these files themselves (not always a platform issue)

This difference is very important when evaluating security reports.


How This Changed My Thinking

Earlier, I focused mainly on finding sensitive data.

Now I focus on:

  • Why the data is exposed
  • Who is responsible
  • Whether it can actually be misused

What Makes a Strong Security Finding

A strong report is not just about showing data is visible.

It should also explain:

  • How someone can misuse it
  • What damage it can cause
  • What system failed to prevent it

How This Can Be Prevented

From a security perspective, platforms can reduce such risks by:

  • Restricting uploads of sensitive file types
  • Scanning files before making them public
  • Removing private information from logs
  • Blocking access to internal files
  • Preventing search engines from indexing sensitive content

bugbounty #cybersecurity #infosec #securityresearch #learning

Top comments (0)