cloudflare
tcp/443
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60ada6004755bd5528c9167178bb15b7db989a9f25
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /api/SMEAPI/GetAssessmentList/{api_key}
GET /api/SMEAPI/ParticipantLoginLink/{ParticipantId}
GET /api/SMEAPI/ParticipantStatus/{ParticipantId}
GET /api/SMEAPI/SMEValidateAPIKey/{api_key}
POST /api/SMEAPI/InviteParticipant
Open service 172.67.197.231:443 · orbitv2.psyentifiq.com
2026-01-22 23:07
HTTP/1.1 200 OK
Date: Thu, 22 Jan 2026 23:07:35 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: close
Server: cloudflare
Cache-Control: no-cache, no-store
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
Set-Cookie: .AspNetCore.Antiforgery.Y6xHpD2GAS8=CfDJ8EQOGtcTX4pKnP2QkeVay_nhGrk85Ay8eatybXm153pokbiz6x2cmh4PRPS_W45zPaMdPAfD4dqApze92PmJzx1OyUf-j9vlB_xUV1zDwSy45u3XQP-vGGHkB6yGmQoD9TvxHrRNoQnBg6T53pdVR3w; path=/; samesite=strict; httponly
Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=TO0rCuCSFYeN4MSFHJgDWrwtzoV9RMzr834dRjGXwFJrL9Z847PZRuCDEFPBODWP4pq%2FvZjY9oPrRc0Vcnxz60lphIpqCTxDX5sJ6yLlifycsC%2BaNyQ%3D"}]}
Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
cf-cache-status: DYNAMIC
CF-RAY: 9c22b55bff7c4dbb-FRA
alt-svc: h3=":443"; ma=86400
Page title: People Psyence - Orbit | Login
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>People Psyence - Orbit | Login</title>
<link href="/css/bootstrap.css" rel="stylesheet">
<link rel="stylesheet" href="https://use.fontawesome.com/releases/v5.2.0/css/all.css" integrity="sha384-hWVjflwFxL6sNzntih27bfxkr27PmbbK/iSvJ+a4+0owXq79v+lsFkW54bOGbiDQ" crossorigin="anonymous">
<link href="/css/animate.css" rel="stylesheet">
<link href="/css/style.css?v=1" rel="stylesheet">
</head>
<body class="gray-bg">
<div class="middle-box loginscreen animated fadeInDown">
<div>
<div>
<img class="logo-img" src="/Images/pps_logo.png" />
<h2 class="logo-name">ORBIT</h2>
</div>
<div class="middle-box text-center loginscreen animated fadeInDown">
<h3>Welcome to Orbit</h3>
</div>
<p></p>
<form method="post" class="m-t">
<div class="form-group">
<br />
<input class="form-control" data-val="true" data-val-email="The Email field is not a valid e-mail address." data-val-required="The Email field is required." id="Email" name="Email" placeholder="Email" type="text" value="" />
<span class="field-validation-valid" data-valmsg-for="Email" data-valmsg-replace="true"></span>
</div>
<div class="form-group">
<input class="form-control" data-val="true" data-val-required="The Password field is required." id="Password" name="Password" placeholder="Password" type="password" />
<span class="field-validation-valid" data-valmsg-for="Password" data-valmsg-replace="true"></span>
</div>
<button type="submit" class="btn btn-primary block full-width m-b font-bold">LOG IN</button>
<span>
<a href="/Account/ForgotPassword%2F1">First Time Login</a> | <a href="/Account/ForgotPassword%2F0">Reset Password</a>
</span>
<input name="__RequestVerificationToken" type="hidden" value="CfDJ8EQOGtcTX4pKnP2QkeVay_mmHPZxLebnNKSulQUkAIpjwFYHZ6vScUJg__EpzVJbMBwds0buklrteu_EiFwAjOBQ9Xxg8X-K2QrtTqlFTDJaGWH9R0kGhQCr7LGPniXfigxuHcp6hpUXEz10hUyDApY" /></form>
<p class="m-t">
<span>Copyright © People Psyence®. All rights reserved</span>
</p>
</div>
</div>
</body>
</html>