@zerothreatai/vulnerability-registry 2.0.0 → 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/dist/categories/authentication.js +17 -0
  2. package/dist/categories/configuration.js +501 -0
  3. package/dist/categories/injection.js +34 -0
  4. package/dist/categories/sensitive-paths.js +84 -0
  5. package/dist/categories/ssrf.js +11 -0
  6. package/dist/categories/xss.js +15 -0
  7. package/dist/category.d.ts +6 -0
  8. package/dist/category.js +15 -0
  9. package/dist/error-codes.d.ts +20 -0
  10. package/dist/error-codes.js +20 -0
  11. package/dist/index.d.ts +9 -1
  12. package/dist/index.js +5 -1
  13. package/dist/scanner.d.ts +6 -0
  14. package/dist/scanner.js +22 -0
  15. package/dist/types.d.ts +2 -0
  16. package/dist-cjs/categories/authentication.js +17 -0
  17. package/dist-cjs/categories/configuration.js +501 -0
  18. package/dist-cjs/categories/injection.js +34 -0
  19. package/dist-cjs/categories/sensitive-paths.js +84 -0
  20. package/dist-cjs/categories/ssrf.js +11 -0
  21. package/dist-cjs/categories/xss.js +15 -0
  22. package/dist-cjs/category.js +18 -0
  23. package/dist-cjs/error-codes.js +20 -0
  24. package/dist-cjs/index.js +7 -1
  25. package/dist-cjs/scanner.js +25 -0
  26. package/package.json +1 -1
  27. package/src/categories/authentication.js +54 -40
  28. package/src/categories/authentication.ts +134 -117
  29. package/src/categories/configuration.js +990 -114
  30. package/src/categories/configuration.ts +1625 -1104
  31. package/src/categories/injection.js +105 -74
  32. package/src/categories/injection.ts +129 -95
  33. package/src/categories/sensitive-paths.js +255 -174
  34. package/src/categories/sensitive-paths.ts +84 -0
  35. package/src/categories/ssrf.js +36 -28
  36. package/src/categories/ssrf.ts +11 -0
  37. package/src/categories/xss.js +47 -35
  38. package/src/categories/xss.ts +15 -0
  39. package/src/category.ts +16 -0
  40. package/src/error-codes.d.ts +38 -0
  41. package/src/error-codes.js +41 -6
  42. package/src/error-codes.ts +25 -5
  43. package/src/index.js +33 -48
  44. package/src/index.ts +20 -14
  45. package/src/scanner.ts +23 -0
  46. package/src/types.d.ts +2 -0
  47. package/src/types.js +1 -2
  48. package/src/types.ts +4 -2
  49. package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
@@ -1,23 +1,21 @@
1
- "use strict";
2
1
  /**
3
2
  * Vulnerability Registry - Sensitive Path Vulnerabilities
4
3
  *
5
4
  * Definitions for all sensitive path exposure vulnerabilities
6
5
  * detected by the sensitive-path-scout scanner.
7
6
  */
8
- Object.defineProperty(exports, "__esModule", { value: true });
9
- exports.SENSITIVE_PATH_VULNERABILITIES = void 0;
10
- const error_codes_js_1 = require("../error-codes.js");
11
- exports.SENSITIVE_PATH_VULNERABILITIES = {
7
+ import { VulnerabilityCode } from '../error-codes.js';
8
+ export const SENSITIVE_PATH_VULNERABILITIES = {
12
9
  // ========================================
13
10
  // CRITICAL - CREDENTIAL EXPOSURE
14
11
  // ========================================
15
- [error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
12
+ [VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
16
13
  id: 88,
17
- code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
14
+ code: VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
18
15
  title: 'AWS Credentials Exposed',
19
16
  description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
20
17
  severity: 'critical',
18
+ levelId: 1,
21
19
  category: 'information_disclosure',
22
20
  scanner: 'sensitive-path-scout',
23
21
  cvss: {
@@ -34,12 +32,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
34
32
  ],
35
33
  remediation: 'Immediately rotate all exposed AWS credentials. Remove credentials from web-accessible paths. Use IAM roles for EC2 instances. Implement AWS Secrets Manager for credential storage.',
36
34
  },
37
- [error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
35
+ [VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
38
36
  id: 89,
39
- code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
37
+ code: VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
40
38
  title: 'SSH Private Key Exposed',
41
39
  description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
42
40
  severity: 'critical',
41
+ levelId: 1,
43
42
  category: 'information_disclosure',
44
43
  scanner: 'sensitive-path-scout',
45
44
  cvss: {
@@ -55,12 +54,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
55
54
  ],
56
55
  remediation: 'Immediately revoke and regenerate all SSH key pairs. Remove key files from web-accessible paths. Audit authorized_keys on all systems. Block access to .ssh directories in web server config.',
57
56
  },
58
- [error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
57
+ [VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
59
58
  id: 90,
60
- code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
59
+ code: VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
61
60
  title: 'SSL/TLS Private Key Exposed',
62
61
  description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
63
62
  severity: 'critical',
63
+ levelId: 1,
64
64
  category: 'cryptographic',
65
65
  scanner: 'sensitive-path-scout',
66
66
  cvss: {
@@ -76,12 +76,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
76
76
  ],
77
77
  remediation: 'Immediately revoke the SSL certificate and generate new key pair. Remove private keys from web-accessible directories. Store keys outside webroot with restricted permissions.',
78
78
  },
79
- [error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
79
+ [VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
80
80
  id: 91,
81
- code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
81
+ code: VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
82
82
  title: 'Rails Master Key Exposed',
83
83
  description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
84
84
  severity: 'critical',
85
+ levelId: 1,
85
86
  category: 'information_disclosure',
86
87
  scanner: 'sensitive-path-scout',
87
88
  cvss: {
@@ -97,12 +98,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
97
98
  ],
98
99
  remediation: 'Regenerate Rails master key immediately. Rotate all credentials encrypted with the old key. Remove master.key from version control and web-accessible paths. Use environment variables.',
99
100
  },
100
- [error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
101
+ [VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
101
102
  id: 92,
102
- code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
103
+ code: VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
103
104
  title: 'Terraform State File Exposed',
104
105
  description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
105
106
  severity: 'critical',
107
+ levelId: 1,
106
108
  category: 'information_disclosure',
107
109
  scanner: 'sensitive-path-scout',
108
110
  cvss: {
@@ -118,12 +120,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
118
120
  ],
119
121
  remediation: 'Remove state files from web-accessible paths. Use remote state backends (S3, GCS, Azure) with encryption. Rotate any credentials found in state file. Enable state encryption.',
120
122
  },
121
- [error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
123
+ [VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
122
124
  id: 93,
123
- code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
125
+ code: VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
124
126
  title: 'Kubernetes Config Exposed',
125
127
  description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
126
128
  severity: 'critical',
129
+ levelId: 1,
127
130
  category: 'information_disclosure',
128
131
  scanner: 'sensitive-path-scout',
129
132
  cvss: {
@@ -139,12 +142,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
139
142
  ],
140
143
  remediation: 'Immediately revoke exposed service account tokens and certificates. Rotate cluster credentials. Remove config from web paths. Use RBAC with minimal permissions.',
141
144
  },
142
- [error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
145
+ [VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
143
146
  id: 94,
144
- code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
147
+ code: VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
145
148
  title: 'HashiCorp Vault Secret Exposed',
146
149
  description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
147
150
  severity: 'critical',
151
+ levelId: 1,
148
152
  category: 'information_disclosure',
149
153
  scanner: 'sensitive-path-scout',
150
154
  cvss: {
@@ -163,12 +167,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
163
167
  // ========================================
164
168
  // HIGH - SOURCE CODE & CONFIG EXPOSURE
165
169
  // ========================================
166
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
170
+ [VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
167
171
  id: 95,
168
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
172
+ code: VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
169
173
  title: 'Git Repository Exposed',
170
174
  description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
171
175
  severity: 'high',
176
+ levelId: 2,
172
177
  category: 'information_disclosure',
173
178
  scanner: 'sensitive-path-scout',
174
179
  cvss: {
@@ -184,12 +189,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
184
189
  ],
185
190
  remediation: 'Block access to .git directory in web server configuration. Remove .git from production deployments. Audit git history for accidentally committed secrets.',
186
191
  },
187
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
192
+ [VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
188
193
  id: 96,
189
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE,
194
+ code: VulnerabilityCode.SENS_HIGH_ENV_FILE,
190
195
  title: 'Environment File Exposed',
191
196
  description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
192
197
  severity: 'high',
198
+ levelId: 2,
193
199
  category: 'information_disclosure',
194
200
  scanner: 'sensitive-path-scout',
195
201
  cvss: {
@@ -205,12 +211,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
205
211
  ],
206
212
  remediation: 'Remove .env files from web-accessible directories. Block access to dotfiles in web server config. Rotate all credentials found in exposed files. Use secrets management services.',
207
213
  },
208
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
214
+ [VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
209
215
  id: 97,
210
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
216
+ code: VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
211
217
  title: 'WordPress Configuration File Exposed',
212
218
  description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
213
219
  severity: 'high',
220
+ levelId: 2,
214
221
  category: 'information_disclosure',
215
222
  scanner: 'sensitive-path-scout',
216
223
  cvss: {
@@ -226,12 +233,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
226
233
  ],
227
234
  remediation: 'Ensure PHP is properly configured to execute .php files rather than serve them as text. Move wp-config.php above the web root. Change database credentials immediately.',
228
235
  },
229
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
236
+ [VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
230
237
  id: 98,
231
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
238
+ code: VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
232
239
  title: 'Spring Boot Actuator Endpoints Exposed',
233
240
  description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
234
241
  severity: 'high',
242
+ levelId: 2,
235
243
  category: 'information_disclosure',
236
244
  scanner: 'sensitive-path-scout',
237
245
  cvss: {
@@ -248,12 +256,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
248
256
  ],
249
257
  remediation: 'Secure actuator endpoints with authentication. Disable sensitive endpoints in production. Use separate management port accessible only internally. Apply principle of least exposure.',
250
258
  },
251
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
259
+ [VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
252
260
  id: 99,
253
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
261
+ code: VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
254
262
  title: 'Spring Boot Heapdump Exposed',
255
263
  description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
256
264
  severity: 'critical',
265
+ levelId: 1,
257
266
  category: 'information_disclosure',
258
267
  scanner: 'sensitive-path-scout',
259
268
  cvss: {
@@ -269,12 +278,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
269
278
  ],
270
279
  remediation: 'Disable heapdump endpoint in production (management.endpoint.heapdump.enabled=false). Require authentication for all actuator endpoints. Invalidate all active sessions.',
271
280
  },
272
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO]: {
281
+ [VulnerabilityCode.SENS_HIGH_PHPINFO]: {
273
282
  id: 100,
274
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO,
283
+ code: VulnerabilityCode.SENS_HIGH_PHPINFO,
275
284
  title: 'PHP Info Page Exposed',
276
285
  description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
277
286
  severity: 'medium',
287
+ levelId: 3,
278
288
  category: 'information_disclosure',
279
289
  scanner: 'sensitive-path-scout',
280
290
  cvss: {
@@ -290,12 +300,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
290
300
  ],
291
301
  remediation: 'Remove phpinfo files from production servers. If needed for debugging, protect with authentication or IP restrictions. Delete all debug and test files before deployment.',
292
302
  },
293
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
303
+ [VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
294
304
  id: 101,
295
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
305
+ code: VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
296
306
  title: 'Laravel Debug Mode Enabled',
297
307
  description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
298
308
  severity: 'high',
309
+ levelId: 2,
299
310
  category: 'information_disclosure',
300
311
  scanner: 'sensitive-path-scout',
301
312
  cvss: {
@@ -311,12 +322,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
311
322
  ],
312
323
  remediation: 'Set APP_DEBUG=false in production environment. Rotate APP_KEY if exposed. Implement proper error logging that does not expose internals to users.',
313
324
  },
314
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
325
+ [VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
315
326
  id: 102,
316
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
327
+ code: VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
317
328
  title: 'GraphQL Introspection Enabled',
318
329
  description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
319
330
  severity: 'medium',
331
+ levelId: 3,
320
332
  category: 'information_disclosure',
321
333
  scanner: 'sensitive-path-scout',
322
334
  cvss: {
@@ -332,12 +344,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
332
344
  ],
333
345
  remediation: 'Disable introspection in production (introspection: false in Apollo Server). Implement query depth limiting and complexity analysis. Use persisted queries.',
334
346
  },
335
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
347
+ [VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
336
348
  id: 103,
337
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
349
+ code: VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
338
350
  title: 'Database Backup File Exposed',
339
351
  description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
340
352
  severity: 'critical',
353
+ levelId: 1,
341
354
  category: 'information_disclosure',
342
355
  scanner: 'sensitive-path-scout',
343
356
  cvss: {
@@ -356,12 +369,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
356
369
  // ========================================
357
370
  // MEDIUM - API & SERVICE EXPOSURE
358
371
  // ========================================
359
- [error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
372
+ [VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
360
373
  id: 104,
361
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
374
+ code: VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
362
375
  title: 'Swagger/OpenAPI Documentation Exposed',
363
376
  description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
364
377
  severity: 'low',
378
+ levelId: 4,
365
379
  category: 'information_disclosure',
366
380
  scanner: 'sensitive-path-scout',
367
381
  cvss: {
@@ -377,12 +391,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
377
391
  ],
378
392
  remediation: 'Protect API documentation with authentication if it should be internal. Ensure publicly documented APIs have proper authorization. Remove internal endpoints from public docs.',
379
393
  },
380
- [error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
394
+ [VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
381
395
  id: 105,
382
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
396
+ code: VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
383
397
  title: 'Prometheus Metrics Endpoint Exposed',
384
398
  description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
385
399
  severity: 'medium',
400
+ levelId: 3,
386
401
  category: 'information_disclosure',
387
402
  scanner: 'sensitive-path-scout',
388
403
  cvss: {
@@ -398,12 +413,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
398
413
  ],
399
414
  remediation: 'Restrict metrics endpoint to internal network or Prometheus server IPs. Use separate port for metrics collection. Implement authentication if external access is required.',
400
415
  },
401
- [error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
416
+ [VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
402
417
  id: 106,
403
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL,
418
+ code: VulnerabilityCode.SENS_MED_ADMIN_PANEL,
404
419
  title: 'Admin Panel Publicly Accessible',
405
420
  description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
406
421
  severity: 'medium',
422
+ levelId: 3,
407
423
  category: 'access_control',
408
424
  scanner: 'sensitive-path-scout',
409
425
  cvss: {
@@ -419,12 +435,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
419
435
  ],
420
436
  remediation: 'Restrict admin panel access to VPN or internal IP ranges. Implement strong multi-factor authentication. Use rate limiting and account lockout. Consider separate admin domain.',
421
437
  },
422
- [error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
438
+ [VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
423
439
  id: 107,
424
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP,
440
+ code: VulnerabilityCode.SENS_MED_SOURCE_MAP,
425
441
  title: 'JavaScript Source Maps Exposed',
426
442
  description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
427
443
  severity: 'low',
444
+ levelId: 4,
428
445
  category: 'information_disclosure',
429
446
  scanner: 'sensitive-path-scout',
430
447
  cvss: {
@@ -443,12 +460,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
443
460
  // ========================================
444
461
  // EXTENDED SENSITIVE PATH EXPOSURES
445
462
  // ========================================
446
- [error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
463
+ [VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
447
464
  id: 203,
448
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
465
+ code: VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
449
466
  title: 'Un Protected Config JSON',
450
467
  description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
451
468
  severity: 'medium',
469
+ levelId: 3,
452
470
  category: 'information_disclosure',
453
471
  scanner: 'sensitive-path-scout',
454
472
  cvss: {
@@ -464,12 +482,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
464
482
  ],
465
483
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
466
484
  },
467
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
485
+ [VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
468
486
  id: 109,
469
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
487
+ code: VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
470
488
  title: 'Web Server Configuration File Detected',
471
489
  description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
472
490
  severity: 'high',
491
+ levelId: 2,
473
492
  category: 'information_disclosure',
474
493
  scanner: 'sensitive-path-scout',
475
494
  cvss: {
@@ -485,12 +504,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
485
504
  ],
486
505
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
487
506
  },
488
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
507
+ [VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
489
508
  id: 110,
490
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
509
+ code: VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
491
510
  title: 'Appsettings JSON Exposed',
492
511
  description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
493
512
  severity: 'high',
513
+ levelId: 2,
494
514
  category: 'information_disclosure',
495
515
  scanner: 'sensitive-path-scout',
496
516
  cvss: {
@@ -506,12 +526,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
506
526
  ],
507
527
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
508
528
  },
509
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
529
+ [VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
510
530
  id: 111,
511
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
531
+ code: VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
512
532
  title: 'Spring Config Exposed',
513
533
  description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
514
534
  severity: 'high',
535
+ levelId: 2,
515
536
  category: 'information_disclosure',
516
537
  scanner: 'sensitive-path-scout',
517
538
  cvss: {
@@ -527,12 +548,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
527
548
  ],
528
549
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
529
550
  },
530
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
551
+ [VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
531
552
  id: 112,
532
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
553
+ code: VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
533
554
  title: 'Npmrc Exposed',
534
555
  description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
535
556
  severity: 'high',
557
+ levelId: 2,
536
558
  category: 'information_disclosure',
537
559
  scanner: 'sensitive-path-scout',
538
560
  cvss: {
@@ -548,12 +570,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
548
570
  ],
549
571
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
550
572
  },
551
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
573
+ [VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
552
574
  id: 113,
553
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
575
+ code: VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
554
576
  title: 'TOML Project File Exposed',
555
577
  description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
556
578
  severity: 'low',
579
+ levelId: 4,
557
580
  category: 'information_disclosure',
558
581
  scanner: 'sensitive-path-scout',
559
582
  cvss: {
@@ -569,12 +592,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
569
592
  ],
570
593
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
571
594
  },
572
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
595
+ [VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
573
596
  id: 114,
574
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
597
+ code: VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
575
598
  title: 'Rails Database YML Exposed',
576
599
  description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
577
600
  severity: 'high',
601
+ levelId: 2,
578
602
  category: 'information_disclosure',
579
603
  scanner: 'sensitive-path-scout',
580
604
  cvss: {
@@ -590,12 +614,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
590
614
  ],
591
615
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
592
616
  },
593
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
617
+ [VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
594
618
  id: 115,
595
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
619
+ code: VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
596
620
  title: 'Drupal Settings PHP Exposed',
597
621
  description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
598
622
  severity: 'high',
623
+ levelId: 2,
599
624
  category: 'information_disclosure',
600
625
  scanner: 'sensitive-path-scout',
601
626
  cvss: {
@@ -611,12 +636,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
611
636
  ],
612
637
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
613
638
  },
614
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
639
+ [VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
615
640
  id: 116,
616
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
641
+ code: VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
617
642
  title: 'Magento Env PHP Exposed',
618
643
  description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
619
644
  severity: 'high',
645
+ levelId: 2,
620
646
  category: 'information_disclosure',
621
647
  scanner: 'sensitive-path-scout',
622
648
  cvss: {
@@ -632,12 +658,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
632
658
  ],
633
659
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
634
660
  },
635
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
661
+ [VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
636
662
  id: 117,
637
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
663
+ code: VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
638
664
  title: 'Jolokia Exposed',
639
665
  description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
640
666
  severity: 'high',
667
+ levelId: 2,
641
668
  category: 'information_disclosure',
642
669
  scanner: 'sensitive-path-scout',
643
670
  cvss: {
@@ -653,12 +680,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
653
680
  ],
654
681
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
655
682
  },
656
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
683
+ [VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
657
684
  id: 118,
658
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
685
+ code: VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
659
686
  title: 'SVN Working Copy Database Exposed',
660
687
  description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
661
688
  severity: 'high',
689
+ levelId: 2,
662
690
  category: 'information_disclosure',
663
691
  scanner: 'sensitive-path-scout',
664
692
  cvss: {
@@ -674,12 +702,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
674
702
  ],
675
703
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
676
704
  },
677
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
705
+ [VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
678
706
  id: 119,
679
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
707
+ code: VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
680
708
  title: 'Subversion Repository Detected',
681
709
  description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
682
710
  severity: 'high',
711
+ levelId: 2,
683
712
  category: 'information_disclosure',
684
713
  scanner: 'sensitive-path-scout',
685
714
  cvss: {
@@ -695,12 +724,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
695
724
  ],
696
725
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
697
726
  },
698
- [error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
727
+ [VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
699
728
  id: 120,
700
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
729
+ code: VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
701
730
  title: 'Mercurial Repository Found',
702
731
  description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
703
732
  severity: 'medium',
733
+ levelId: 3,
704
734
  category: 'information_disclosure',
705
735
  scanner: 'sensitive-path-scout',
706
736
  cvss: {
@@ -716,12 +746,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
716
746
  ],
717
747
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
718
748
  },
719
- [error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
749
+ [VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
720
750
  id: 121,
721
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
751
+ code: VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
722
752
  title: 'Mercurial Hgrc Exposed',
723
753
  description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
724
754
  severity: 'medium',
755
+ levelId: 3,
725
756
  category: 'information_disclosure',
726
757
  scanner: 'sensitive-path-scout',
727
758
  cvss: {
@@ -737,12 +768,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
737
768
  ],
738
769
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
739
770
  },
740
- [error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
771
+ [VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
741
772
  id: 122,
742
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
773
+ code: VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
743
774
  title: 'CVS Root Exposed',
744
775
  description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
745
776
  severity: 'medium',
777
+ levelId: 3,
746
778
  category: 'information_disclosure',
747
779
  scanner: 'sensitive-path-scout',
748
780
  cvss: {
@@ -758,12 +790,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
758
790
  ],
759
791
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
760
792
  },
761
- [error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
793
+ [VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
762
794
  id: 123,
763
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
795
+ code: VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
764
796
  title: 'CVS Entries Exposed',
765
797
  description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
766
798
  severity: 'medium',
799
+ levelId: 3,
767
800
  category: 'information_disclosure',
768
801
  scanner: 'sensitive-path-scout',
769
802
  cvss: {
@@ -779,12 +812,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
779
812
  ],
780
813
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
781
814
  },
782
- [error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
815
+ [VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
783
816
  id: 124,
784
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
817
+ code: VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
785
818
  title: 'Bazaar Repo Exposed',
786
819
  description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
787
820
  severity: 'medium',
821
+ levelId: 3,
788
822
  category: 'information_disclosure',
789
823
  scanner: 'sensitive-path-scout',
790
824
  cvss: {
@@ -800,12 +834,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
800
834
  ],
801
835
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
802
836
  },
803
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
837
+ [VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
804
838
  id: 125,
805
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
839
+ code: VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
806
840
  title: 'Spring Boot Thread Dump Exposed',
807
841
  description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
808
842
  severity: 'high',
843
+ levelId: 2,
809
844
  category: 'information_disclosure',
810
845
  scanner: 'sensitive-path-scout',
811
846
  cvss: {
@@ -821,12 +856,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
821
856
  ],
822
857
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
823
858
  },
824
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
859
+ [VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
825
860
  id: 126,
826
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
861
+ code: VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
827
862
  title: 'Redis Rdb Dump Detected',
828
863
  description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
829
864
  severity: 'high',
865
+ levelId: 2,
830
866
  category: 'information_disclosure',
831
867
  scanner: 'sensitive-path-scout',
832
868
  cvss: {
@@ -842,12 +878,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
842
878
  ],
843
879
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
844
880
  },
845
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
881
+ [VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
846
882
  id: 127,
847
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
883
+ code: VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
848
884
  title: 'Atlassian Bitbucket Pipelines Configuration Detected',
849
885
  description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
850
886
  severity: 'low',
887
+ levelId: 4,
851
888
  category: 'information_disclosure',
852
889
  scanner: 'sensitive-path-scout',
853
890
  cvss: {
@@ -863,12 +900,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
863
900
  ],
864
901
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
865
902
  },
866
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
903
+ [VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
867
904
  id: 128,
868
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
905
+ code: VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
869
906
  title: 'AZURE Pipelines Configuration Detected',
870
907
  description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
871
908
  severity: 'low',
909
+ levelId: 4,
872
910
  category: 'information_disclosure',
873
911
  scanner: 'sensitive-path-scout',
874
912
  cvss: {
@@ -884,12 +922,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
884
922
  ],
885
923
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
886
924
  },
887
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
925
+ [VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
888
926
  id: 129,
889
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
927
+ code: VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
890
928
  title: 'AWS Code Build Buildspec Detected',
891
929
  description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
892
930
  severity: 'low',
931
+ levelId: 4,
893
932
  category: 'information_disclosure',
894
933
  scanner: 'sensitive-path-scout',
895
934
  cvss: {
@@ -905,12 +944,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
905
944
  ],
906
945
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
907
946
  },
908
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
947
+ [VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
909
948
  id: 130,
910
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
949
+ code: VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
911
950
  title: 'Github Actions Workflow Detected',
912
951
  description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
913
952
  severity: 'low',
953
+ levelId: 4,
914
954
  category: 'information_disclosure',
915
955
  scanner: 'sensitive-path-scout',
916
956
  cvss: {
@@ -926,12 +966,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
926
966
  ],
927
967
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
928
968
  },
929
- [error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
969
+ [VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
930
970
  id: 131,
931
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
971
+ code: VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
932
972
  title: 'Docker Compose Configuration Detected',
933
973
  description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
934
974
  severity: 'medium',
975
+ levelId: 3,
935
976
  category: 'information_disclosure',
936
977
  scanner: 'sensitive-path-scout',
937
978
  cvss: {
@@ -947,12 +988,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
947
988
  ],
948
989
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
949
990
  },
950
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
991
+ [VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
951
992
  id: 132,
952
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD,
993
+ code: VulnerabilityCode.SENS_HIGH_TRACE_AXD,
953
994
  title: 'Trace Axd',
954
995
  description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
955
996
  severity: 'high',
997
+ levelId: 2,
956
998
  category: 'information_disclosure',
957
999
  scanner: 'sensitive-path-scout',
958
1000
  cvss: {
@@ -968,12 +1010,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
968
1010
  ],
969
1011
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
970
1012
  },
971
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
1013
+ [VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
972
1014
  id: 133,
973
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
1015
+ code: VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
974
1016
  title: 'Elmah Axd Exposed',
975
1017
  description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
976
1018
  severity: 'high',
1019
+ levelId: 2,
977
1020
  category: 'information_disclosure',
978
1021
  scanner: 'sensitive-path-scout',
979
1022
  cvss: {
@@ -989,12 +1032,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
989
1032
  ],
990
1033
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
991
1034
  },
992
- [error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
1035
+ [VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
993
1036
  id: 134,
994
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
1037
+ code: VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
995
1038
  title: 'Laravel Log Viewer Enabled',
996
1039
  description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
997
1040
  severity: 'medium',
1041
+ levelId: 3,
998
1042
  category: 'information_disclosure',
999
1043
  scanner: 'sensitive-path-scout',
1000
1044
  cvss: {
@@ -1010,12 +1054,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1010
1054
  ],
1011
1055
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1012
1056
  },
1013
- [error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
1057
+ [VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
1014
1058
  id: 135,
1015
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
1059
+ code: VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
1016
1060
  title: 'Apache Htaccess File Detected',
1017
1061
  description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1018
1062
  severity: 'medium',
1063
+ levelId: 3,
1019
1064
  category: 'information_disclosure',
1020
1065
  scanner: 'sensitive-path-scout',
1021
1066
  cvss: {
@@ -1031,12 +1076,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1031
1076
  ],
1032
1077
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1033
1078
  },
1034
- [error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
1079
+ [VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
1035
1080
  id: 136,
1036
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
1081
+ code: VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
1037
1082
  title: 'Apache Server Info Exposed',
1038
1083
  description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1039
1084
  severity: 'medium',
1085
+ levelId: 3,
1040
1086
  category: 'information_disclosure',
1041
1087
  scanner: 'sensitive-path-scout',
1042
1088
  cvss: {
@@ -1052,12 +1098,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1052
1098
  ],
1053
1099
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1054
1100
  },
1055
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
1101
+ [VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
1056
1102
  id: 137,
1057
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
1103
+ code: VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
1058
1104
  title: 'Sqlite Database Detected',
1059
1105
  description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1060
1106
  severity: 'high',
1107
+ levelId: 2,
1061
1108
  category: 'information_disclosure',
1062
1109
  scanner: 'sensitive-path-scout',
1063
1110
  cvss: {
@@ -1073,12 +1120,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1073
1120
  ],
1074
1121
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1075
1122
  },
1076
- [error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
1123
+ [VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
1077
1124
  id: 138,
1078
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
1125
+ code: VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
1079
1126
  title: 'Package Dependencies Detected',
1080
1127
  description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1081
1128
  severity: 'medium',
1129
+ levelId: 3,
1082
1130
  category: 'information_disclosure',
1083
1131
  scanner: 'sensitive-path-scout',
1084
1132
  cvss: {
@@ -1094,12 +1142,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1094
1142
  ],
1095
1143
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1096
1144
  },
1097
- [error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
1145
+ [VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
1098
1146
  id: 139,
1099
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
1147
+ code: VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
1100
1148
  title: 'PHP Composer Dependencies Detected',
1101
1149
  description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1102
1150
  severity: 'medium',
1151
+ levelId: 3,
1103
1152
  category: 'information_disclosure',
1104
1153
  scanner: 'sensitive-path-scout',
1105
1154
  cvss: {
@@ -1115,12 +1164,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1115
1164
  ],
1116
1165
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1117
1166
  },
1118
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
1167
+ [VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
1119
1168
  id: 140,
1120
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
1169
+ code: VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
1121
1170
  title: 'Python Requirements Detected',
1122
1171
  description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1123
1172
  severity: 'low',
1173
+ levelId: 4,
1124
1174
  category: 'information_disclosure',
1125
1175
  scanner: 'sensitive-path-scout',
1126
1176
  cvss: {
@@ -1136,12 +1186,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1136
1186
  ],
1137
1187
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1138
1188
  },
1139
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
1189
+ [VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
1140
1190
  id: 141,
1141
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
1191
+ code: VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
1142
1192
  title: 'AWS Config Exposed',
1143
1193
  description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1144
1194
  severity: 'high',
1195
+ levelId: 2,
1145
1196
  category: 'information_disclosure',
1146
1197
  scanner: 'sensitive-path-scout',
1147
1198
  cvss: {
@@ -1157,12 +1208,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1157
1208
  ],
1158
1209
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1159
1210
  },
1160
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
1211
+ [VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
1161
1212
  id: 142,
1162
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
1213
+ code: VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
1163
1214
  title: 'AZURE Credentials Exposed',
1164
1215
  description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1165
1216
  severity: 'high',
1217
+ levelId: 2,
1166
1218
  category: 'information_disclosure',
1167
1219
  scanner: 'sensitive-path-scout',
1168
1220
  cvss: {
@@ -1178,12 +1230,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1178
1230
  ],
1179
1231
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1180
1232
  },
1181
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
1233
+ [VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
1182
1234
  id: 143,
1183
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
1235
+ code: VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
1184
1236
  title: 'Helm Values Exposed',
1185
1237
  description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1186
1238
  severity: 'high',
1239
+ levelId: 2,
1187
1240
  category: 'information_disclosure',
1188
1241
  scanner: 'sensitive-path-scout',
1189
1242
  cvss: {
@@ -1199,12 +1252,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1199
1252
  ],
1200
1253
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1201
1254
  },
1202
- [error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
1255
+ [VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
1203
1256
  id: 144,
1204
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
1257
+ code: VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
1205
1258
  title: 'SSH Public Key Exposed',
1206
1259
  description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1207
1260
  severity: 'medium',
1261
+ levelId: 3,
1208
1262
  category: 'information_disclosure',
1209
1263
  scanner: 'sensitive-path-scout',
1210
1264
  cvss: {
@@ -1220,12 +1274,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1220
1274
  ],
1221
1275
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1222
1276
  },
1223
- [error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
1277
+ [VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
1224
1278
  id: 145,
1225
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
1279
+ code: VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
1226
1280
  title: 'SSL Certificate Exposed',
1227
1281
  description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1228
1282
  severity: 'medium',
1283
+ levelId: 3,
1229
1284
  category: 'information_disclosure',
1230
1285
  scanner: 'sensitive-path-scout',
1231
1286
  cvss: {
@@ -1241,12 +1296,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1241
1296
  ],
1242
1297
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1243
1298
  },
1244
- [error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
1299
+ [VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
1245
1300
  id: 146,
1246
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
1301
+ code: VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
1247
1302
  title: 'Graph Ql Endpoint Exposed',
1248
1303
  description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1249
1304
  severity: 'medium',
1305
+ levelId: 3,
1250
1306
  category: 'information_disclosure',
1251
1307
  scanner: 'sensitive-path-scout',
1252
1308
  cvss: {
@@ -1262,12 +1318,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1262
1318
  ],
1263
1319
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1264
1320
  },
1265
- [error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
1321
+ [VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
1266
1322
  id: 147,
1267
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
1323
+ code: VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
1268
1324
  title: 'Graphi Ql Exposed',
1269
1325
  description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1270
1326
  severity: 'medium',
1327
+ levelId: 3,
1271
1328
  category: 'information_disclosure',
1272
1329
  scanner: 'sensitive-path-scout',
1273
1330
  cvss: {
@@ -1283,12 +1340,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1283
1340
  ],
1284
1341
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1285
1342
  },
1286
- [error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
1343
+ [VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
1287
1344
  id: 148,
1288
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
1345
+ code: VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
1289
1346
  title: 'Terraform Lock Exposed',
1290
1347
  description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1291
1348
  severity: 'medium',
1349
+ levelId: 3,
1292
1350
  category: 'information_disclosure',
1293
1351
  scanner: 'sensitive-path-scout',
1294
1352
  cvss: {
@@ -1304,12 +1362,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1304
1362
  ],
1305
1363
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1306
1364
  },
1307
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
1365
+ [VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
1308
1366
  id: 149,
1309
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
1367
+ code: VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
1310
1368
  title: 'Terraform Vars Exposed',
1311
1369
  description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1312
1370
  severity: 'high',
1371
+ levelId: 2,
1313
1372
  category: 'information_disclosure',
1314
1373
  scanner: 'sensitive-path-scout',
1315
1374
  cvss: {
@@ -1325,12 +1384,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1325
1384
  ],
1326
1385
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1327
1386
  },
1328
- [error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
1387
+ [VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
1329
1388
  id: 150,
1330
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
1389
+ code: VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
1331
1390
  title: 'Error Log Exposed',
1332
1391
  description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1333
1392
  severity: 'medium',
1393
+ levelId: 3,
1334
1394
  category: 'information_disclosure',
1335
1395
  scanner: 'sensitive-path-scout',
1336
1396
  cvss: {
@@ -1346,12 +1406,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1346
1406
  ],
1347
1407
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1348
1408
  },
1349
- [error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
1409
+ [VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
1350
1410
  id: 151,
1351
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
1411
+ code: VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
1352
1412
  title: 'Access Log Exposed',
1353
1413
  description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1354
1414
  severity: 'medium',
1415
+ levelId: 3,
1355
1416
  category: 'information_disclosure',
1356
1417
  scanner: 'sensitive-path-scout',
1357
1418
  cvss: {
@@ -1367,12 +1428,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1367
1428
  ],
1368
1429
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1369
1430
  },
1370
- [error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
1431
+ [VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
1371
1432
  id: 152,
1372
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
1433
+ code: VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
1373
1434
  title: 'Debug Log Exposed',
1374
1435
  description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1375
1436
  severity: 'medium',
1437
+ levelId: 3,
1376
1438
  category: 'information_disclosure',
1377
1439
  scanner: 'sensitive-path-scout',
1378
1440
  cvss: {
@@ -1388,12 +1450,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1388
1450
  ],
1389
1451
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1390
1452
  },
1391
- [error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
1453
+ [VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
1392
1454
  id: 153,
1393
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
1455
+ code: VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
1394
1456
  title: 'Application Log Exposed',
1395
1457
  description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1396
1458
  severity: 'medium',
1459
+ levelId: 3,
1397
1460
  category: 'information_disclosure',
1398
1461
  scanner: 'sensitive-path-scout',
1399
1462
  cvss: {
@@ -1409,12 +1472,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1409
1472
  ],
1410
1473
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1411
1474
  },
1412
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
1475
+ [VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
1413
1476
  id: 154,
1414
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
1477
+ code: VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
1415
1478
  title: 'Laravel Log Exposed',
1416
1479
  description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1417
1480
  severity: 'high',
1481
+ levelId: 2,
1418
1482
  category: 'information_disclosure',
1419
1483
  scanner: 'sensitive-path-scout',
1420
1484
  cvss: {
@@ -1430,12 +1494,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1430
1494
  ],
1431
1495
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1432
1496
  },
1433
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
1497
+ [VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
1434
1498
  id: 155,
1435
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
1499
+ code: VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
1436
1500
  title: 'Word Press Debug Log Exposed',
1437
1501
  description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1438
1502
  severity: 'high',
1503
+ levelId: 2,
1439
1504
  category: 'information_disclosure',
1440
1505
  scanner: 'sensitive-path-scout',
1441
1506
  cvss: {
@@ -1451,12 +1516,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1451
1516
  ],
1452
1517
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1453
1518
  },
1454
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
1519
+ [VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
1455
1520
  id: 156,
1456
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
1521
+ code: VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
1457
1522
  title: 'Adminer Exposed',
1458
1523
  description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1459
1524
  severity: 'high',
1525
+ levelId: 2,
1460
1526
  category: 'information_disclosure',
1461
1527
  scanner: 'sensitive-path-scout',
1462
1528
  cvss: {
@@ -1472,12 +1538,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1472
1538
  ],
1473
1539
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1474
1540
  },
1475
- [error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
1541
+ [VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
1476
1542
  id: 157,
1477
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
1543
+ code: VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
1478
1544
  title: 'WSDL Exposed',
1479
1545
  description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1480
1546
  severity: 'medium',
1547
+ levelId: 3,
1481
1548
  category: 'information_disclosure',
1482
1549
  scanner: 'sensitive-path-scout',
1483
1550
  cvss: {
@@ -1493,12 +1560,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1493
1560
  ],
1494
1561
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1495
1562
  },
1496
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
1563
+ [VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
1497
1564
  id: 158,
1498
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
1565
+ code: VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
1499
1566
  title: 'Debug Endpoint Exposed',
1500
1567
  description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1501
1568
  severity: 'high',
1569
+ levelId: 2,
1502
1570
  category: 'information_disclosure',
1503
1571
  scanner: 'sensitive-path-scout',
1504
1572
  cvss: {
@@ -1514,12 +1582,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1514
1582
  ],
1515
1583
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1516
1584
  },
1517
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
1585
+ [VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
1518
1586
  id: 159,
1519
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
1587
+ code: VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
1520
1588
  title: 'Go Debug Vars Exposed',
1521
1589
  description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1522
1590
  severity: 'high',
1591
+ levelId: 2,
1523
1592
  category: 'information_disclosure',
1524
1593
  scanner: 'sensitive-path-scout',
1525
1594
  cvss: {
@@ -1535,12 +1604,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1535
1604
  ],
1536
1605
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1537
1606
  },
1538
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
1607
+ [VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
1539
1608
  id: 160,
1540
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
1609
+ code: VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
1541
1610
  title: 'Go Pprof Exposed',
1542
1611
  description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1543
1612
  severity: 'high',
1613
+ levelId: 2,
1544
1614
  category: 'information_disclosure',
1545
1615
  scanner: 'sensitive-path-scout',
1546
1616
  cvss: {
@@ -1556,12 +1626,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1556
1626
  ],
1557
1627
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1558
1628
  },
1559
- [error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
1629
+ [VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
1560
1630
  id: 161,
1561
- code: error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
1631
+ code: VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
1562
1632
  title: 'Word Press XML Rpc Exposed',
1563
1633
  description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1564
1634
  severity: 'medium',
1635
+ levelId: 3,
1565
1636
  category: 'information_disclosure',
1566
1637
  scanner: 'sensitive-path-scout',
1567
1638
  cvss: {
@@ -1577,12 +1648,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1577
1648
  ],
1578
1649
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1579
1650
  },
1580
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
1651
+ [VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
1581
1652
  id: 162,
1582
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
1653
+ code: VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
1583
1654
  title: 'Test Endpoint Exposed',
1584
1655
  description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1585
1656
  severity: 'low',
1657
+ levelId: 4,
1586
1658
  category: 'information_disclosure',
1587
1659
  scanner: 'sensitive-path-scout',
1588
1660
  cvss: {
@@ -1598,12 +1670,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1598
1670
  ],
1599
1671
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1600
1672
  },
1601
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
1673
+ [VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
1602
1674
  id: 163,
1603
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
1675
+ code: VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
1604
1676
  title: 'Staging Endpoint Exposed',
1605
1677
  description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1606
1678
  severity: 'low',
1679
+ levelId: 4,
1607
1680
  category: 'information_disclosure',
1608
1681
  scanner: 'sensitive-path-scout',
1609
1682
  cvss: {
@@ -1619,12 +1692,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1619
1692
  ],
1620
1693
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1621
1694
  },
1622
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
1695
+ [VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
1623
1696
  id: 164,
1624
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
1697
+ code: VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
1625
1698
  title: 'Editor Backup File Detected',
1626
1699
  description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1627
1700
  severity: 'low',
1701
+ levelId: 4,
1628
1702
  category: 'information_disclosure',
1629
1703
  scanner: 'sensitive-path-scout',
1630
1704
  cvss: {
@@ -1640,12 +1714,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1640
1714
  ],
1641
1715
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1642
1716
  },
1643
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
1717
+ [VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
1644
1718
  id: 165,
1645
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
1719
+ code: VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
1646
1720
  title: 'VIM Swap File Detected',
1647
1721
  description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1648
1722
  severity: 'low',
1723
+ levelId: 4,
1649
1724
  category: 'information_disclosure',
1650
1725
  scanner: 'sensitive-path-scout',
1651
1726
  cvss: {
@@ -1661,12 +1736,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1661
1736
  ],
1662
1737
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1663
1738
  },
1664
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
1739
+ [VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
1665
1740
  id: 166,
1666
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
1741
+ code: VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
1667
1742
  title: 'Directory Listing Enabled',
1668
1743
  description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1669
1744
  severity: 'low',
1745
+ levelId: 4,
1670
1746
  category: 'information_disclosure',
1671
1747
  scanner: 'sensitive-path-scout',
1672
1748
  cvss: {
@@ -1682,12 +1758,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1682
1758
  ],
1683
1759
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1684
1760
  },
1685
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
1761
+ [VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
1686
1762
  id: 167,
1687
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
1763
+ code: VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
1688
1764
  title: 'AZURE Storage Config Exposed',
1689
1765
  description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1690
1766
  severity: 'high',
1767
+ levelId: 2,
1691
1768
  category: 'information_disclosure',
1692
1769
  scanner: 'sensitive-path-scout',
1693
1770
  cvss: {
@@ -1703,12 +1780,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1703
1780
  ],
1704
1781
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1705
1782
  },
1706
- [error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
1783
+ [VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
1707
1784
  id: 168,
1708
- code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
1785
+ code: VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
1709
1786
  title: 'Mongo Rc Exposed',
1710
1787
  description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1711
1788
  severity: 'high',
1789
+ levelId: 2,
1712
1790
  category: 'information_disclosure',
1713
1791
  scanner: 'sensitive-path-scout',
1714
1792
  cvss: {
@@ -1724,12 +1802,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1724
1802
  ],
1725
1803
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1726
1804
  },
1727
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
1805
+ [VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
1728
1806
  id: 169,
1729
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
1807
+ code: VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
1730
1808
  title: 'Awssam Template Exposed',
1731
1809
  description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1732
1810
  severity: 'low',
1811
+ levelId: 4,
1733
1812
  category: 'information_disclosure',
1734
1813
  scanner: 'sensitive-path-scout',
1735
1814
  cvss: {
@@ -1745,12 +1824,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1745
1824
  ],
1746
1825
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1747
1826
  },
1748
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
1827
+ [VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
1749
1828
  id: 170,
1750
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
1829
+ code: VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
1751
1830
  title: 'Serverless Config Exposed',
1752
1831
  description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1753
1832
  severity: 'low',
1833
+ levelId: 4,
1754
1834
  category: 'information_disclosure',
1755
1835
  scanner: 'sensitive-path-scout',
1756
1836
  cvss: {
@@ -1766,12 +1846,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1766
1846
  ],
1767
1847
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1768
1848
  },
1769
- [error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
1849
+ [VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
1770
1850
  id: 171,
1771
- code: error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
1851
+ code: VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
1772
1852
  title: 'Cloud Formation Template Exposed',
1773
1853
  description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1774
1854
  severity: 'low',
1855
+ levelId: 4,
1775
1856
  category: 'information_disclosure',
1776
1857
  scanner: 'sensitive-path-scout',
1777
1858
  cvss: {
@@ -1788,4 +1869,4 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1788
1869
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1789
1870
  },
1790
1871
  };
1791
- exports.default = exports.SENSITIVE_PATH_VULNERABILITIES;
1872
+ export default SENSITIVE_PATH_VULNERABILITIES;