Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Locust Exposure

By kannthu

Vidoc logoVidoc Module

What is the "Locust Exposure" module?

The "Locust Exposure" module is designed to detect misconfigurations in the Locust software. Locust is a popular open-source load testing tool written in Python. This module focuses on identifying potential security vulnerabilities related to Locust.

This module has a medium severity level, indicating that the detected misconfigurations could potentially lead to security risks if left unaddressed.

This module was authored by DhiyaneshDK.


If misconfigurations are found using the "Locust Exposure" module, it could expose sensitive information or provide unauthorized access to the Locust application. This could potentially lead to data breaches, unauthorized usage, or other security incidents.

How does the module work?

The "Locust Exposure" module works by performing HTTP requests and applying specific matching conditions to identify misconfigurations in the Locust software.

One of the matching conditions used by this module is to search for specific keywords in the HTML response body, such as "<title>Locust</title>", "locust.js", and "Charts</a>". If any of these keywords are found, it indicates the presence of Locust-related components or features.

In addition, the module checks the HTTP response status code, ensuring that it is 200 (indicating a successful response). This condition helps confirm the availability of the Locust application.

By combining these matching conditions, the module can effectively detect misconfigurations in the Locust software.

Module preview

Concurrent Requests (0)
Passive global matcher
word: <title>Locust</title>and
word: locust.js, Charts</a>and
status: 200
On match action
Report vulnerability