.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d63a747c263a747c263a747c263a747c2
Found 1 files trough .DS_Store spidering: /application
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d63a747c263a747c263a747c263a747c2
Found 1 files trough .DS_Store spidering: /application
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1b885ff43a81ce88f562b774ca7894bf46905fba96905fba9
Public Swagger UI/API detected at path: /swagger.json - sample paths: GET /coupons GET /coupons/hascoupon GET /coupons/verify GET /language
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d63a747c263a747c263a747c263a747c2
Found 1 files trough .DS_Store spidering: /application
Open service 45.154.183.183:443 · kashedatype.com
2025-12-22 06:54
HTTP/1.1 403 Forbidden Date: Mon, 22 Dec 2025 06:54:20 GMT Content-Type: text/html Content-Length: 118 Connection: close X-Varnish: 22496141 Age: 0 Via: 1.1 varnish (Varnish/6.3) section-io-cache: Miss section-io-id: 96889de95be8d5421775028b37a7c3b1 Page title: 403 Forbidden <html> <head><title>403 Forbidden</title></head> <body> <center><h1>403 Forbidden</h1></center> </body> </html>
Open service 45.154.183.183:80 · kashedatype.com
2025-12-20 18:43
HTTP/1.1 403 Forbidden Date: Sat, 20 Dec 2025 18:43:04 GMT Content-Type: text/html Content-Length: 118 Connection: close X-Varnish: 17434438 Age: 0 Via: 1.1 varnish (Varnish/6.3) section-io-cache: Miss section-io-id: dfd51c4f05936e8bcab9174d08945e99 Page title: 403 Forbidden <html> <head><title>403 Forbidden</title></head> <body> <center><h1>403 Forbidden</h1></center> </body> </html>
Open service 45.154.183.183:443 · kashedatype.com
2025-12-20 18:43
HTTP/1.1 403 Forbidden Date: Sat, 20 Dec 2025 18:43:03 GMT Content-Type: text/html Content-Length: 118 Connection: close X-Varnish: 20443512 Age: 0 Via: 1.1 varnish (Varnish/6.3) section-io-cache: Miss section-io-id: 620de6d1127623db8d821a7c789e2745 Page title: 403 Forbidden <html> <head><title>403 Forbidden</title></head> <body> <center><h1>403 Forbidden</h1></center> </body> </html>
Open service 45.154.183.183:443 · kashedatype.com
2025-12-20 07:26
HTTP/1.1 403 Forbidden Date: Sat, 20 Dec 2025 07:26:14 GMT Content-Type: text/html Content-Length: 118 Connection: close X-Varnish: 1068441 Age: 0 Via: 1.1 varnish (Varnish/6.3) section-io-cache: Miss section-io-id: 2b468e2018c4de7658ff7e9a81d83a3f Page title: 403 Forbidden <html> <head><title>403 Forbidden</title></head> <body> <center><h1>403 Forbidden</h1></center> </body> </html>