ethical-hacker video for an attacker is using DumpsterDiver, an automated tool, to identify potential secret leaks and hardcoded passwords in target cloud
An attacker is using DumpsterDiver, an automated tool, to identify potential secret leaks and hardcoded passwords in target cloud services. Which of the following flags is set by the attacker to analyze the files using rules specified in “ rules.yaml ”?