Back to Library

Exposed Jupyter Notebooks

PRO

Finds publicly accessible Jupyter Notebook instances that may contain sensitive code, API keys, or data analysis results.

Intermediate
High risk - authorized use only
bug bounty

Google Dork Query:

••••••••••••••••••••••••••••••••••
0
Not verified

What It Does

This dork uses the 'intitle:' operator to match keywords in the page title, the 'inurl:' operator to filter results by URL path keywords, and the '""' operator to enforce exact phrase matching. Results help identify targets within bug bounty scope that may contain reportable security vulnerabilities.

Common Use Cases

  • Bug Bounty Reconnaissance: Discover "Jupyter Notebook" pages as part of initial reconnaissance for bug bounty programs.
  • Attack Surface Mapping: Map the external attack surface by identifying "Jupyter Notebook" pages that expand the scope of testing.
  • Reward Program Research: Find "Jupyter Notebook" pages within the scope of active bug bounty programs to maximize discovery potential.

How to Use Safely

  1. Execute this dork to discover "Jupyter Notebook" pages related to your target.
  2. Verify that each finding falls within the scope of the bug bounty program.
  3. Document the vulnerability with reproduction steps and impact assessment.
  4. Submit findings through the program's official reporting channel with supporting evidence.

Responsible Use Required

This dork should only be used on systems you own or have explicit authorization to test. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and obtain proper permission before testing.

TAGS

jupyter
notebook
python
data-science