| id | sha256 | pattern_name | match_type | match | location | length |
| 1 | 6716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20e | Debug/Test Credentials | regex | admin_password | 4:5 | 14 |
| 2 | 6716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20e | Debug/Test Credentials | regex | test_key | 5:5 | 8 |
| 3 | 6716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20e | JWT Token | regex | eyJhbGciOiJIUzI1NiJ9.eyJSb2xlIjoiQWRtaW4ifQ.fake_jwt_token_here | 11:19 | 63 |
| 4 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | SQL Statement | regex | SELECT * FROM users | 15:10 | 19 |
| 5 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | SQL Statement | regex | SELECT name FROM users | 16:13 | 22 |
| 6 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | PHP system/exec | regex | system( | 7:0 | 7 |
| 7 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | PHP system/exec | regex | exec( | 8:0 | 5 |
| 8 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | PHP system/exec | regex | shell_exec( | 9:0 | 11 |
| 9 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | PHP system/exec | regex | passthru( | 10:0 | 9 |
| 10 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | PHP system/exec | regex | popen( | 11:0 | 6 |
| 11 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | PHP Unserialize | regex | unserialize( | 20:7 | 12 |
| 12 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Path Traversal | regex | ../ | 23:9 | 3 |
| 13 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Path Traversal | regex | ../ | 23:12 | 3 |
| 14 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Path Traversal | regex | ../ | 23:15 | 3 |
| 15 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Script Tag | regex | <script>alert('XSS')</script> | 27:6 | 29 |
| 16 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Event Handler | regex | onclick= | 28:12 | 8 |
| 17 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Event Handler | regex | onerror= | 34:17 | 8 |
| 18 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Event Handler | regex | onmouseover= | 35:9 | 12 |
| 19 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Event Handler | regex | onfocus= | 36:11 | 8 |
| 20 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Debug/Test Credentials | regex | admin_secret | 48:1 | 12 |
| 21 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Debug/Test Credentials | regex | admin_password | 48:30 | 14 |
| 22 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Hardcoded Secret | regex | api_key = "sk-abcdef1234567890abcdef1234567890" | 47:1 | 47 |
| 23 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Hardcoded Secret | regex | secret = "super_secret_admin_password_123" | 48:7 | 42 |
| 24 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Request Parameter | regex | $_GET[ | 6:7 | 6 |
| 25 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Request Parameter | regex | $_POST[ | 8:5 | 7 |
| 26 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Request Parameter | regex | $_GET[ | 9:19 | 6 |
| 27 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Request Parameter | regex | $_GET[ | 11:6 | 6 |
| 28 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Request Parameter | regex | $_GET[ | 14:6 | 6 |
| 29 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Request Parameter | regex | $_GET[ | 19:8 | 6 |
| 30 | c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07 | Request Parameter | regex | $_GET[ | 24:8 | 6 |
| 31 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | SQL Statement | regex | SELECT * FROM users | 16:13 | 19 |
| 32 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | SQL Statement | regex | INSERT INTO audit_log | 18:14 | 21 |
| 33 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | SQL Statement | regex | UPDATE settings SET value | 19:14 | 25 |
| 34 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | SQL Statement | regex | DELETE FROM temp | 20:14 | 16 |
| 35 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | String Concatenation SQL | regex | + "' WHERE | 19:69 | 11 |
| 36 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Python os.system | regex | os.system( | 28:4 | 10 |
| 37 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | PHP system/exec | regex | system( | 28:7 | 7 |
| 38 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Python Pickle | regex | pickle.loads( | 37:10 | 13 |
| 39 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Path Traversal | regex | ../ | 44:12 | 3 |
| 40 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Path Traversal | regex | ../ | 44:15 | 3 |
| 41 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Path Traversal | regex | ../ | 44:18 | 3 |
| 42 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Debug/Test Credentials | regex | test_password | 50:0 | 13 |
| 43 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Debug/Test Credentials | regex | admin_key | 51:0 | 9 |
| 44 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Hardcoded Secret | regex | TOKEN = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjoiYWRtaW4ifQ.fake" | 49:4 | 74 |
| 45 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | JWT Token | regex | eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjoiYWRtaW4ifQ.fake | 49:13 | 64 |
| 46 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Request Parameter | regex | request.form[ | 15:14 | 13 |
| 47 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Request Parameter | regex | request.form[ | 18:49 | 13 |
| 48 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Request Parameter | regex | request.form[ | 19:47 | 13 |
| 49 | 63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146 | Request Parameter | regex | request.form[ | 20:51 | 13 |
| 50 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | SQL Statement | regex | SELECT * FROM users | 18:24 | 19 |
| 51 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | SQL Statement | regex | INSERT INTO logs | 20:30 | 16 |
| 52 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | SQL Statement | regex | UPDATE users SET name | 21:30 | 21 |
| 53 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | SQL Statement | regex | DELETE FROM sessions | 22:30 | 20 |
| 54 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | String Concatenation SQL | regex | + "' WHERE | 21:88 | 11 |
| 55 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Java Exec | regex | Runtime.getRuntime().exec( | 26:8 | 26 |
| 56 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | PHP system/exec | regex | exec( | 26:29 | 5 |
| 57 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Java Deserialization | regex | ObjectInputStream | 29:8 | 17 |
| 58 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Java Deserialization | regex | ObjectInputStream | 29:36 | 17 |
| 59 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Java Deserialization | regex | readObject( | 30:25 | 11 |
| 60 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Path Traversal | regex | ../ | 33:23 | 3 |
| 61 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Path Traversal | regex | ../ | 33:26 | 3 |
| 62 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Path Traversal | regex | ../ | 33:29 | 3 |
| 63 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Path Traversal | regex | ../ | 34:30 | 3 |
| 64 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Path Traversal | regex | ../ | 34:33 | 3 |
| 65 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Path Traversal | regex | ../ | 34:36 | 3 |
| 66 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Script Tag | regex | <script>alert('XSS')</script> | 37:38 | 29 |
| 67 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Debug/Test Credentials | regex | debug_password | 42:15 | 14 |
| 68 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Debug/Test Credentials | regex | test_secret | 43:15 | 11 |
| 69 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Hardcoded Secret | regex | secret = "sk-12345678abcdefghijklmnopqrstuvwxyz12345678" | 40:15 | 56 |
| 70 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Hardcoded Secret | regex | token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c" | 41:15 | 165 |
| 71 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Hardcoded Secret | regex | secret = "very_secret_value_12345678" | 43:20 | 37 |
| 72 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | JWT Token | regex | eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c | 41:24 | 155 |
| 73 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Request Parameter | regex | request.getParameter( | 17:24 | 21 |
| 74 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Request Parameter | regex | request.getParameter( | 21:59 | 21 |
| 75 | 22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613 | Request Parameter | regex | request.getParameter( | 25:26 | 21 |
| 76 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | SQL Statement | regex | SELECT * FROM users | 18:24 | 19 |
| 77 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | SQL Statement | regex | INSERT INTO logs | 20:30 | 16 |
| 78 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | SQL Statement | regex | UPDATE users SET name | 21:30 | 21 |
| 79 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | SQL Statement | regex | DELETE FROM sessions | 22:30 | 20 |
| 80 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | String Concatenation SQL | regex | + "' WHERE | 21:88 | 11 |
| 81 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Java Exec | regex | Runtime.getRuntime().exec( | 26:8 | 26 |
| 82 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | PHP system/exec | regex | exec( | 26:29 | 5 |
| 83 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Java Deserialization | regex | ObjectInputStream | 29:8 | 17 |
| 84 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Java Deserialization | regex | ObjectInputStream | 29:36 | 17 |
| 85 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Java Deserialization | regex | readObject( | 30:25 | 11 |
| 86 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Path Traversal | regex | ../ | 33:23 | 3 |
| 87 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Path Traversal | regex | ../ | 33:26 | 3 |
| 88 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Path Traversal | regex | ../ | 33:29 | 3 |
| 89 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Path Traversal | regex | ..%2F | 34:30 | 5 |
| 90 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Path Traversal | regex | ..%2F | 34:35 | 5 |
| 91 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Path Traversal | regex | ..%2F | 34:40 | 5 |
| 92 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Script Tag | regex | <script>alert('XSS')</script> | 37:38 | 29 |
| 93 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Debug/Test Credentials | regex | debug_password | 42:15 | 14 |
| 94 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Debug/Test Credentials | regex | test_secret | 43:15 | 11 |
| 95 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Hardcoded Secret | regex | secret = "sk-12345678abcdefghijklmnopqrstuvwxyz12345678" | 40:15 | 56 |
| 96 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Hardcoded Secret | regex | token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c" | 41:15 | 165 |
| 97 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Hardcoded Secret | regex | secret = "very_secret_value_12345678" | 43:20 | 37 |
| 98 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | JWT Token | regex | eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c | 41:24 | 155 |
| 99 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Request Parameter | regex | request.getParameter( | 17:24 | 21 |
| 100 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Request Parameter | regex | request.getParameter( | 21:59 | 21 |
| 101 | b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec | Request Parameter | regex | request.getParameter( | 25:26 | 21 |