After scanning for public .git directories and exposed .env files. I scanned the dataset of 2.6 million domains for exposed .DS_Store files. I found 8'462 exposed .DS_Store files. From these files I extracted 19'266 unique folder and file names. About 40% of these file are accessible. 10 database dumps with usernames and passwords, config files, ssl certificates and “pseudo hidden” admin panels where exposed.