保護DataHogo
LearnFree ToolsBlogPricingWhy I Built ThisSign inGet Started
Back to all vulnerabilities

Serverless & Cloud

Function timeout abuse, over-privileged roles, env vars in logs, shared /tmp state, and cold start state leaks in serverless environments.

5 vulnerabilities

Function Timeout Abuse

medium

Serverless functions without a configured timeout can be kept running indefinitely by malicious or malformed requests, draining your budget.

CWE-400A05:2021

Over-privileged IAM Roles

medium

Giving serverless functions or services more IAM permissions than they need turns a minor breach into a full account compromise.

CWE-269A01:2021

Environment Variables in Logs

high

Logging process.env dumps all your secrets — API keys, database passwords, signing keys — directly into your log system.

CWE-532A09:2021

Shared /tmp State

medium

Serverless functions reuse execution environments between invocations, so sensitive files written to /tmp can be read by later requests from different users.

CWE-377A02:2021

Cold Start State Leak

medium

Global variables in serverless functions persist across invocations in the same execution environment, leaking user data between requests.

CWE-400A02:2021
保護DataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Why I Built This
  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.