deno gcp-europe-west2
tcp/443
deno gcp-us-east4
tcp/443
GraphQL introspection is enabled.
This could leak to data leak if not properly configured.
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3a3d27671a9660cf3d4f276dce602bf017e016d85
GraphQL introspection enabled at /graphql Types: 35 (by kind: ENUM: 8, OBJECT: 23, SCALAR: 4) Operations: - Query: Query | fields: adminData, adventure, currentUser, edge, instance - Mutation: Mutation | fields: createAdventure, createEdge, createNode, deleteAdventure, deleteCurrentUser Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5) Readable stores: 0
Severity: medium
Fingerprint: c2db3a1c40d490db84e0e350ea72115ca13ed1e0f36600e39cfc8fd671f870d6
GraphQL introspection enabled at /api Types: 35 (by kind: ENUM: 8, OBJECT: 23, SCALAR: 4) Operations: - Query: Query | fields: adminData, adventure, currentUser, edge, instance - Mutation: Mutation | fields: createAdventure, createEdge, createNode, deleteAdventure, deleteCurrentUser Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5) Readable stores: 0
GraphQL introspection is enabled.
This could leak to data leak if not properly configured.
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3a3d27671a9660cf3d4f276dce602bf017e016d85
GraphQL introspection enabled at /graphql Types: 35 (by kind: ENUM: 8, OBJECT: 23, SCALAR: 4) Operations: - Query: Query | fields: adminData, adventure, currentUser, edge, instance - Mutation: Mutation | fields: createAdventure, createEdge, createNode, deleteAdventure, deleteCurrentUser Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5) Readable stores: 0
Severity: medium
Fingerprint: c2db3a1c40d490db84e0e350ea72115ca13ed1e0f36600e39cfc8fd671f870d6
GraphQL introspection enabled at /api Types: 35 (by kind: ENUM: 8, OBJECT: 23, SCALAR: 4) Operations: - Query: Query | fields: adminData, adventure, currentUser, edge, instance - Mutation: Mutation | fields: createAdventure, createEdge, createNode, deleteAdventure, deleteCurrentUser Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5) Readable stores: 0
Open service 34.120.54.55:443 · www.api.textbasedadventures.com
2026-01-23 06:35
HTTP/1.1 400 Bad Request
x-powered-by: Express
access-control-allow-origin: *
x-clerk-auth-reason: session-token-and-uat-missing
x-clerk-auth-status: signed-out
content-type: application/json; charset=utf-8
content-length: 1420
etag: W/"58c-ZzELaSM9oyh1LiWo/0kHSQMbFUQ"
vary: Accept-Encoding
connection: close
date: Fri, 23 Jan 2026 06:35:03 GMT
via: http/1.1 edgeproxy-h
server: deno/gcp-europe-west2
{"errors":[{"message":"This operation has been blocked as a potential Cross-Site Request Forgery (CSRF). Please either specify a 'content-type' header (with a type that is not one of application/x-www-form-urlencoded, multipart/form-data, text/plain) or provide a non-empty value for one of the following headers: x-apollo-operation-name, apollo-require-preflight\n","extensions":{"code":"BAD_REQUEST","stacktrace":["BadRequestError: This operation has been blocked as a potential Cross-Site Request Forgery (CSRF). Please either specify a 'content-type' header (with a type that is not one of application/x-www-form-urlencoded, multipart/form-data, text/plain) or provide a non-empty value for one of the following headers: x-apollo-operation-name, apollo-require-preflight",""," at new GraphQLErrorWithCode (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/internalErrorClasses.js:7:9)"," at new BadRequestError (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/internalErrorClasses.js:75:9)"," at preventCsrf (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/preventCsrf.js:29:11)"," at ApolloServer.executeHTTPGraphQLRequest (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/ApolloServer.js:507:17)"," at eventLoopTick (ext:core/01_core.js:178:7)"]}}]}
Open service 34.120.54.55:443 · api.textbasedadventures.com
2026-01-23 05:55
HTTP/1.1 400 Bad Request
x-powered-by: Express
access-control-allow-origin: *
x-clerk-auth-reason: session-token-and-uat-missing
x-clerk-auth-status: signed-out
content-type: application/json; charset=utf-8
content-length: 1420
etag: W/"58c-ZzELaSM9oyh1LiWo/0kHSQMbFUQ"
vary: Accept-Encoding
connection: close
date: Fri, 23 Jan 2026 05:55:21 GMT
via: http/1.1 edgeproxy-h
server: deno/gcp-us-east4
{"errors":[{"message":"This operation has been blocked as a potential Cross-Site Request Forgery (CSRF). Please either specify a 'content-type' header (with a type that is not one of application/x-www-form-urlencoded, multipart/form-data, text/plain) or provide a non-empty value for one of the following headers: x-apollo-operation-name, apollo-require-preflight\n","extensions":{"code":"BAD_REQUEST","stacktrace":["BadRequestError: This operation has been blocked as a potential Cross-Site Request Forgery (CSRF). Please either specify a 'content-type' header (with a type that is not one of application/x-www-form-urlencoded, multipart/form-data, text/plain) or provide a non-empty value for one of the following headers: x-apollo-operation-name, apollo-require-preflight",""," at new GraphQLErrorWithCode (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/internalErrorClasses.js:7:9)"," at new BadRequestError (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/internalErrorClasses.js:75:9)"," at preventCsrf (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/preventCsrf.js:29:11)"," at ApolloServer.executeHTTPGraphQLRequest (file:///node_modules/.deno/@apollo+server@4.11.2/node_modules/@apollo/server/dist/esm/ApolloServer.js:507:17)"," at eventLoopTick (ext:core/01_core.js:178:7)"]}}]}