Kestrel
tcp/443 tcp/80
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad03549c63689b93ff213739117a92f38e31adb9e1ab33c
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
DELETE /api/v1/DataQualityChecks/DeleteDataQualityCheck
DELETE /api/v1/DwhDatabase/DwhDatabasesDelete
DELETE /api/v1/ScheduledExecutions/ScheduledExecutionDelete
GET /api/v1/DataQualityChecks/FindById/{id}
GET /api/v1/DataQualityChecks/List
GET /api/v1/DataQualityChecks/{id}
GET /api/v1/DwhDatabase
GET /api/v1/DwhDatabase/DWHDatabaseBehavior
GET /api/v1/DwhDatabase/DWHDatabasePerformance
GET /api/v1/DwhDatabase/DWHDatabasePerformanceFolderList
GET /api/v1/DwhDatabase/DwhDatabaseDetails
GET /api/v1/DwhDatabase/DwhDatabasePerformancePackageList
GET /api/v1/DwhDatabase/DwhDatabaseTables
GET /api/v1/Executions
GET /api/v1/Executions/Details
GET /api/v1/MMDwhDatabasesUsersNotification/Details
GET /api/v1/MMScheduledExecutionDataQualityCheck/Delete
GET /api/v1/ScheduledExecutions/ScheduledExecutionDetails
GET /api/v1/ScheduledExecutions/ScheduledExecutionExecute
GET /api/v1/ScheduledExecutions/ScheduledExecutionList
GET /api/v1/Users/Details
GET /api/v1/Users/List
OPTIONS /api/v1/DwhDatabase/DwhDatabaseSwitch
OPTIONS /api/v1/MMDwhDatabasesUsersNotification/SetNotification
POST /api/v1/DataQualityChecks
POST /api/v1/DataQualityChecks/Execute
POST /api/v1/DwhDatabase/DwhDatabaseCreate
POST /api/v1/Error/LogError
POST /api/v1/ScheduledExecutions/ScheduledExecutionCreate
POST /api/v1/Users/Create
POST /api/v1/Users/Delete
POST /api/v1/Users/Edit
POST /api/v1/Users/Login
POST /api/v1/Users/RefreshToken
PUT /api/v1/DwhDatabase/DwhDatabseUpdate
PUT /api/v1/ScheduledExecutions/ScheduledExecutionUpdate
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad03549c63689b93ff213739117a92f38e31adb9e1ab33c
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
DELETE /api/v1/DataQualityChecks/DeleteDataQualityCheck
DELETE /api/v1/DwhDatabase/DwhDatabasesDelete
DELETE /api/v1/ScheduledExecutions/ScheduledExecutionDelete
GET /api/v1/DataQualityChecks/FindById/{id}
GET /api/v1/DataQualityChecks/List
GET /api/v1/DataQualityChecks/{id}
GET /api/v1/DwhDatabase
GET /api/v1/DwhDatabase/DWHDatabaseBehavior
GET /api/v1/DwhDatabase/DWHDatabasePerformance
GET /api/v1/DwhDatabase/DWHDatabasePerformanceFolderList
GET /api/v1/DwhDatabase/DwhDatabaseDetails
GET /api/v1/DwhDatabase/DwhDatabasePerformancePackageList
GET /api/v1/DwhDatabase/DwhDatabaseTables
GET /api/v1/Executions
GET /api/v1/Executions/Details
GET /api/v1/MMDwhDatabasesUsersNotification/Details
GET /api/v1/MMScheduledExecutionDataQualityCheck/Delete
GET /api/v1/ScheduledExecutions/ScheduledExecutionDetails
GET /api/v1/ScheduledExecutions/ScheduledExecutionExecute
GET /api/v1/ScheduledExecutions/ScheduledExecutionList
GET /api/v1/Users/Details
GET /api/v1/Users/List
OPTIONS /api/v1/DwhDatabase/DwhDatabaseSwitch
OPTIONS /api/v1/MMDwhDatabasesUsersNotification/SetNotification
POST /api/v1/DataQualityChecks
POST /api/v1/DataQualityChecks/Execute
POST /api/v1/DwhDatabase/DwhDatabaseCreate
POST /api/v1/Error/LogError
POST /api/v1/ScheduledExecutions/ScheduledExecutionCreate
POST /api/v1/Users/Create
POST /api/v1/Users/Delete
POST /api/v1/Users/Edit
POST /api/v1/Users/Login
POST /api/v1/Users/RefreshToken
PUT /api/v1/DwhDatabase/DwhDatabseUpdate
PUT /api/v1/ScheduledExecutions/ScheduledExecutionUpdate
Open service 20.50.2.68:80 · uranus-api.internal.congatec.app
2026-02-09 11:36
HTTP/1.1 400 Bad Request
Connection: close
Content-Type: application/json
Date: Mon, 09 Feb 2026 11:36:51 GMT
Server: Kestrel
Transfer-Encoding: chunked
Request-Context: appId=cid-v1:37b13602-dced-49f5-bccf-a64f32bbcca9
{"Error":"The call you made was not found. For all available endpoints, check \u003Ca href=\u0022/swagger\u0022\u003Eswaggegr\u003C/a\u003E"}
Open service 20.50.2.68:443 · uranus-api.internal.congatec.app
2026-01-23 08:22
HTTP/1.1 400 Bad Request
Connection: close
Content-Type: application/json
Date: Fri, 23 Jan 2026 08:23:03 GMT
Server: Kestrel
Transfer-Encoding: chunked
Request-Context: appId=cid-v1:37b13602-dced-49f5-bccf-a64f32bbcca9
{"Error":"The call you made was not found. For all available endpoints, check \u003Ca href=\u0022/swagger\u0022\u003Eswaggegr\u003C/a\u003E"}
Open service 20.50.2.68:80 · uranus-api.internal.congatec.app
2026-01-23 08:22
HTTP/1.1 400 Bad Request
Connection: close
Content-Type: application/json
Date: Fri, 23 Jan 2026 08:23:03 GMT
Server: Kestrel
Transfer-Encoding: chunked
Request-Context: appId=cid-v1:37b13602-dced-49f5-bccf-a64f32bbcca9
{"Error":"The call you made was not found. For all available endpoints, check \u003Ca href=\u0022/swagger\u0022\u003Eswaggegr\u003C/a\u003E"}