Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a02c33ef9db54b4cb6a1c54df915d2571e
Found 13 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/listening/1 /ttp/listening/2 /ttp/listening/practice1 /ttp/reading /ttp/reading/1 /ttp/reading/2 /ttp/reading/practice1 /ttp/speaking /ttp/writing /ttp/writing/1 /ttp/writing/2
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733fab9e8c3667ebd8cdebd1d5a197b726b4
Found 10 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/reading /ttp/reading/1 /ttp/reading/2 /ttp/reading/practice1 /ttp/speaking /ttp/speaking/1 /ttp/speaking/2 /ttp/writing
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d8c9dc8a08c9dc8a08c9dc8a08c9dc8a0
Found 1 files trough .DS_Store spidering: /ttp
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733fab9e8c3667ebd8cdebd1d5a1f5b4e824
Found 10 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/reading /ttp/reading/1 /ttp/reading/2 /ttp/reading/practice1 /ttp/speaking /ttp/writing /ttp/writing/1 /ttp/writing/2
Severity: low
Fingerprint: 5f32cf5d6962f09c3af247253af247252bcc2398a0868a7f3e5ce24ff8ff4e8b
Found 9 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/reading /ttp/speaking /ttp/speaking/1 /ttp/speaking/2 /ttp/writing /ttp/writing/1 /ttp/writing/2
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392ab902b016a247ab7f1ad0efb458e140026
Found 7 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/reading /ttp/speaking /ttp/speaking/1 /ttp/speaking/2 /ttp/writing
Severity: low
Fingerprint: 5f32cf5d6962f09c3c1fc5e93c1fc5e94393c00492bc571bfaf18f6b3764ef77
Found 5 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/reading /ttp/speaking /ttp/writing
Severity: low
Fingerprint: 5f32cf5d6962f09cec7f8772ec7f87726312fa1bf5712454b70345ebc4694f6f
Found 11 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/listening/1 /ttp/listening/2 /ttp/listening/practice1 /ttp/reading /ttp/reading/1 /ttp/reading/2 /ttp/reading/practice1 /ttp/speaking /ttp/writing
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a02c33ef9db54b4cb6a1c54df9675b2d26
Found 13 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/listening/1 /ttp/listening/2 /ttp/listening/practice1 /ttp/reading /ttp/reading/1 /ttp/reading/2 /ttp/reading/practice1 /ttp/speaking /ttp/speaking/1 /ttp/speaking/2 /ttp/writing
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d81b5692650f5b988e015d94118f9a2747
Found 8 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/listening/1 /ttp/listening/2 /ttp/listening/practice1 /ttp/reading /ttp/speaking /ttp/writing
Severity: low
Fingerprint: 5f32cf5d6962f09cc169dbbec169dbbea748cedf8328e4186efaf0d7a0446253
Found 15 files trough .DS_Store spidering: /ttp /ttp/listening /ttp/listening/1 /ttp/listening/2 /ttp/listening/practice1 /ttp/reading /ttp/reading/1 /ttp/reading/2 /ttp/reading/practice1 /ttp/speaking /ttp/speaking/1 /ttp/speaking/2 /ttp/writing /ttp/writing/1 /ttp/writing/2