That's a pretty easy path to find targets, full details tweeted to you daily. And probably high rate of success, as somebody already felt the need to pastebin it.<p>I worry about unprotected S3 buckets too. There's probably a Twitter bot coming soon for those: <a href="https://community.rapid7.com/community/infosec/blog/2013/03/27/1951-open-s3-buckets" rel="nofollow">https://community.rapid7.com/community/infosec/blog/2013/03/...</a>
If you are interested to run your own pastebin (or alike) analysis, AIL is a "modular framework to analyse potential information leaks from unstructured data sources like pastes from pastebin or similar services or unstructured data streams." <a href="https://github.com/CIRCL/AIL-framework" rel="nofollow">https://github.com/CIRCL/AIL-framework</a>
This seems like a great idea, but taking a look at what the Twitter bot is posting shows it tweets a lot of false positives, such as hashes of files (which it presumably thinks might be password hashes)