@zerothreatai/vulnerability-registry 4.0.0 → 6.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (99) hide show
  1. package/dist/categories/authentication.js +17 -17
  2. package/dist/categories/configuration.js +80 -80
  3. package/dist/categories/injection.js +34 -34
  4. package/dist/categories/sensitive-paths.js +84 -84
  5. package/dist/categories/ssrf.js +11 -11
  6. package/dist/categories/xss.js +15 -15
  7. package/dist/compliance-codes.d.ts +207 -0
  8. package/dist/compliance-codes.js +213 -0
  9. package/dist/compliances/gdpr.d.ts +2 -0
  10. package/dist/compliances/gdpr.js +252 -0
  11. package/dist/compliances/helpers.d.ts +6 -0
  12. package/dist/compliances/helpers.js +11 -0
  13. package/dist/compliances/hipaa.d.ts +2 -0
  14. package/dist/compliances/hipaa.js +187 -0
  15. package/dist/compliances/index.d.ts +5 -0
  16. package/dist/compliances/index.js +5 -0
  17. package/dist/compliances/owasp.d.ts +2 -0
  18. package/dist/compliances/owasp.js +127 -0
  19. package/dist/compliances/pci-dss.d.ts +2 -0
  20. package/dist/compliances/pci-dss.js +260 -0
  21. package/dist/compliances/sans-top-25.d.ts +2 -0
  22. package/dist/compliances/sans-top-25.js +242 -0
  23. package/dist/index.d.ts +7 -1
  24. package/dist/index.js +7 -1
  25. package/dist/types.d.ts +33 -0
  26. package/dist/types.js +11 -1
  27. package/dist-cjs/categories/authentication.js +17 -17
  28. package/dist-cjs/categories/configuration.js +80 -80
  29. package/dist-cjs/categories/injection.js +34 -34
  30. package/dist-cjs/categories/sensitive-paths.js +84 -84
  31. package/dist-cjs/categories/ssrf.js +11 -11
  32. package/dist-cjs/categories/xss.js +15 -15
  33. package/dist-cjs/compliance-codes.js +216 -0
  34. package/dist-cjs/compliances/gdpr.js +255 -0
  35. package/dist-cjs/compliances/helpers.js +19 -0
  36. package/dist-cjs/compliances/hipaa.js +190 -0
  37. package/dist-cjs/compliances/index.js +13 -0
  38. package/dist-cjs/compliances/owasp.js +130 -0
  39. package/dist-cjs/compliances/pci-dss.js +263 -0
  40. package/dist-cjs/compliances/sans-top-25.js +245 -0
  41. package/dist-cjs/index.js +12 -1
  42. package/dist-cjs/types.js +12 -0
  43. package/package.json +40 -32
  44. package/scripts/assign-ids.ts +105 -0
  45. package/scripts/check-duplicate-ids.ts +45 -0
  46. package/src/categories/authentication.ts +17 -17
  47. package/src/categories/configuration.ts +80 -80
  48. package/src/categories/injection.ts +34 -34
  49. package/src/categories/sensitive-paths.ts +84 -84
  50. package/src/categories/ssrf.ts +11 -11
  51. package/src/categories/xss.ts +15 -15
  52. package/src/compliance-codes.ts +216 -0
  53. package/src/compliances/README.md +82 -0
  54. package/src/compliances/gdpr.ts +258 -0
  55. package/src/compliances/helpers.ts +29 -0
  56. package/src/compliances/hipaa.ts +193 -0
  57. package/src/compliances/index.ts +5 -0
  58. package/src/compliances/owasp.ts +133 -0
  59. package/src/compliances/pci-dss.ts +266 -0
  60. package/src/compliances/sans-top-25.ts +246 -0
  61. package/src/id-registry.json +1235 -0
  62. package/src/index.ts +12 -1
  63. package/src/types.ts +40 -4
  64. package/src/categories/authentication.d.ts +0 -8
  65. package/src/categories/authentication.d.ts.map +0 -1
  66. package/src/categories/authentication.js +0 -392
  67. package/src/categories/authentication.js.map +0 -1
  68. package/src/categories/configuration.d.ts +0 -8
  69. package/src/categories/configuration.d.ts.map +0 -1
  70. package/src/categories/configuration.js +0 -1782
  71. package/src/categories/configuration.js.map +0 -1
  72. package/src/categories/injection.d.ts +0 -8
  73. package/src/categories/injection.d.ts.map +0 -1
  74. package/src/categories/injection.js +0 -781
  75. package/src/categories/injection.js.map +0 -1
  76. package/src/categories/sensitive-paths.d.ts +0 -9
  77. package/src/categories/sensitive-paths.d.ts.map +0 -1
  78. package/src/categories/sensitive-paths.js +0 -1872
  79. package/src/categories/sensitive-paths.js.map +0 -1
  80. package/src/categories/ssrf.d.ts +0 -8
  81. package/src/categories/ssrf.d.ts.map +0 -1
  82. package/src/categories/ssrf.js +0 -258
  83. package/src/categories/ssrf.js.map +0 -1
  84. package/src/categories/xss.d.ts +0 -7
  85. package/src/categories/xss.d.ts.map +0 -1
  86. package/src/categories/xss.js +0 -340
  87. package/src/categories/xss.js.map +0 -1
  88. package/src/error-codes.d.ts +0 -280
  89. package/src/error-codes.d.ts.map +0 -1
  90. package/src/error-codes.js +0 -350
  91. package/src/error-codes.js.map +0 -1
  92. package/src/index.d.ts +0 -60
  93. package/src/index.d.ts.map +0 -1
  94. package/src/index.js +0 -92
  95. package/src/index.js.map +0 -1
  96. package/src/types.d.ts +0 -88
  97. package/src/types.d.ts.map +0 -1
  98. package/src/types.js +0 -6
  99. package/src/types.js.map +0 -1
@@ -13,7 +13,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
13
13
  // CRITICAL - CREDENTIAL EXPOSURE
14
14
  // ========================================
15
15
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
16
- id: 88,
16
+ id: 500,
17
17
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
18
18
  title: 'AWS Credentials Exposed',
19
19
  description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
@@ -36,7 +36,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
36
36
  remediation: 'Immediately rotate all exposed AWS credentials. Remove credentials from web-accessible paths. Use IAM roles for EC2 instances. Implement AWS Secrets Manager for credential storage.',
37
37
  },
38
38
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
39
- id: 89,
39
+ id: 501,
40
40
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
41
41
  title: 'SSH Private Key Exposed',
42
42
  description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
@@ -58,7 +58,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
58
58
  remediation: 'Immediately revoke and regenerate all SSH key pairs. Remove key files from web-accessible paths. Audit authorized_keys on all systems. Block access to .ssh directories in web server config.',
59
59
  },
60
60
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
61
- id: 90,
61
+ id: 502,
62
62
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
63
63
  title: 'SSL/TLS Private Key Exposed',
64
64
  description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
@@ -80,7 +80,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
80
80
  remediation: 'Immediately revoke the SSL certificate and generate new key pair. Remove private keys from web-accessible directories. Store keys outside webroot with restricted permissions.',
81
81
  },
82
82
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
83
- id: 91,
83
+ id: 503,
84
84
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
85
85
  title: 'Rails Master Key Exposed',
86
86
  description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
@@ -102,7 +102,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
102
102
  remediation: 'Regenerate Rails master key immediately. Rotate all credentials encrypted with the old key. Remove master.key from version control and web-accessible paths. Use environment variables.',
103
103
  },
104
104
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
105
- id: 92,
105
+ id: 504,
106
106
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
107
107
  title: 'Terraform State File Exposed',
108
108
  description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
@@ -124,7 +124,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
124
124
  remediation: 'Remove state files from web-accessible paths. Use remote state backends (S3, GCS, Azure) with encryption. Rotate any credentials found in state file. Enable state encryption.',
125
125
  },
126
126
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
127
- id: 93,
127
+ id: 505,
128
128
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
129
129
  title: 'Kubernetes Config Exposed',
130
130
  description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
@@ -146,7 +146,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
146
146
  remediation: 'Immediately revoke exposed service account tokens and certificates. Rotate cluster credentials. Remove config from web paths. Use RBAC with minimal permissions.',
147
147
  },
148
148
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
149
- id: 94,
149
+ id: 506,
150
150
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
151
151
  title: 'HashiCorp Vault Secret Exposed',
152
152
  description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
@@ -171,7 +171,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
171
171
  // HIGH - SOURCE CODE & CONFIG EXPOSURE
172
172
  // ========================================
173
173
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
174
- id: 95,
174
+ id: 507,
175
175
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
176
176
  title: 'Git Repository Exposed',
177
177
  description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
@@ -193,7 +193,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
193
193
  remediation: 'Block access to .git directory in web server configuration. Remove .git from production deployments. Audit git history for accidentally committed secrets.',
194
194
  },
195
195
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
196
- id: 96,
196
+ id: 508,
197
197
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE,
198
198
  title: 'Environment File Exposed',
199
199
  description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
@@ -215,7 +215,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
215
215
  remediation: 'Remove .env files from web-accessible directories. Block access to dotfiles in web server config. Rotate all credentials found in exposed files. Use secrets management services.',
216
216
  },
217
217
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
218
- id: 97,
218
+ id: 509,
219
219
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
220
220
  title: 'WordPress Configuration File Exposed',
221
221
  description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
@@ -237,7 +237,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
237
237
  remediation: 'Ensure PHP is properly configured to execute .php files rather than serve them as text. Move wp-config.php above the web root. Change database credentials immediately.',
238
238
  },
239
239
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
240
- id: 98,
240
+ id: 510,
241
241
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
242
242
  title: 'Spring Boot Actuator Endpoints Exposed',
243
243
  description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
@@ -260,7 +260,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
260
260
  remediation: 'Secure actuator endpoints with authentication. Disable sensitive endpoints in production. Use separate management port accessible only internally. Apply principle of least exposure.',
261
261
  },
262
262
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
263
- id: 99,
263
+ id: 511,
264
264
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
265
265
  title: 'Spring Boot Heapdump Exposed',
266
266
  description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
@@ -282,7 +282,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
282
282
  remediation: 'Disable heapdump endpoint in production (management.endpoint.heapdump.enabled=false). Require authentication for all actuator endpoints. Invalidate all active sessions.',
283
283
  },
284
284
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO]: {
285
- id: 100,
285
+ id: 512,
286
286
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO,
287
287
  title: 'PHP Info Page Exposed',
288
288
  description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
@@ -304,7 +304,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
304
304
  remediation: 'Remove phpinfo files from production servers. If needed for debugging, protect with authentication or IP restrictions. Delete all debug and test files before deployment.',
305
305
  },
306
306
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
307
- id: 101,
307
+ id: 513,
308
308
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
309
309
  title: 'Laravel Debug Mode Enabled',
310
310
  description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
@@ -326,7 +326,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
326
326
  remediation: 'Set APP_DEBUG=false in production environment. Rotate APP_KEY if exposed. Implement proper error logging that does not expose internals to users.',
327
327
  },
328
328
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
329
- id: 102,
329
+ id: 514,
330
330
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
331
331
  title: 'GraphQL Introspection Enabled',
332
332
  description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
@@ -348,7 +348,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
348
348
  remediation: 'Disable introspection in production (introspection: false in Apollo Server). Implement query depth limiting and complexity analysis. Use persisted queries.',
349
349
  },
350
350
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
351
- id: 103,
351
+ id: 515,
352
352
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
353
353
  title: 'Database Backup File Exposed',
354
354
  description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
@@ -373,7 +373,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
373
373
  // MEDIUM - API & SERVICE EXPOSURE
374
374
  // ========================================
375
375
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
376
- id: 104,
376
+ id: 516,
377
377
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
378
378
  title: 'Swagger/OpenAPI Documentation Exposed',
379
379
  description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
@@ -395,7 +395,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
395
395
  remediation: 'Protect API documentation with authentication if it should be internal. Ensure publicly documented APIs have proper authorization. Remove internal endpoints from public docs.',
396
396
  },
397
397
  [error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
398
- id: 105,
398
+ id: 517,
399
399
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
400
400
  title: 'Prometheus Metrics Endpoint Exposed',
401
401
  description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
@@ -417,7 +417,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
417
417
  remediation: 'Restrict metrics endpoint to internal network or Prometheus server IPs. Use separate port for metrics collection. Implement authentication if external access is required.',
418
418
  },
419
419
  [error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
420
- id: 106,
420
+ id: 518,
421
421
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL,
422
422
  title: 'Admin Panel Publicly Accessible',
423
423
  description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
@@ -439,7 +439,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
439
439
  remediation: 'Restrict admin panel access to VPN or internal IP ranges. Implement strong multi-factor authentication. Use rate limiting and account lockout. Consider separate admin domain.',
440
440
  },
441
441
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
442
- id: 107,
442
+ id: 519,
443
443
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP,
444
444
  title: 'JavaScript Source Maps Exposed',
445
445
  description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
@@ -464,7 +464,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
464
464
  // EXTENDED SENSITIVE PATH EXPOSURES
465
465
  // ========================================
466
466
  [error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
467
- id: 203,
467
+ id: 520,
468
468
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
469
469
  title: 'Un Protected Config JSON',
470
470
  description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -486,7 +486,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
486
486
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
487
487
  },
488
488
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
489
- id: 109,
489
+ id: 521,
490
490
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
491
491
  title: 'Web Server Configuration File Detected',
492
492
  description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -508,7 +508,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
508
508
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
509
509
  },
510
510
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
511
- id: 110,
511
+ id: 522,
512
512
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
513
513
  title: 'Appsettings JSON Exposed',
514
514
  description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -530,7 +530,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
530
530
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
531
531
  },
532
532
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
533
- id: 111,
533
+ id: 523,
534
534
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
535
535
  title: 'Spring Config Exposed',
536
536
  description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -552,7 +552,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
552
552
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
553
553
  },
554
554
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
555
- id: 112,
555
+ id: 524,
556
556
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
557
557
  title: 'Npmrc Exposed',
558
558
  description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -574,7 +574,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
574
574
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
575
575
  },
576
576
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
577
- id: 113,
577
+ id: 525,
578
578
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
579
579
  title: 'TOML Project File Exposed',
580
580
  description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -596,7 +596,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
596
596
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
597
597
  },
598
598
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
599
- id: 114,
599
+ id: 526,
600
600
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
601
601
  title: 'Rails Database YML Exposed',
602
602
  description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -618,7 +618,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
618
618
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
619
619
  },
620
620
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
621
- id: 115,
621
+ id: 527,
622
622
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
623
623
  title: 'Drupal Settings PHP Exposed',
624
624
  description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -640,7 +640,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
640
640
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
641
641
  },
642
642
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
643
- id: 116,
643
+ id: 528,
644
644
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
645
645
  title: 'Magento Env PHP Exposed',
646
646
  description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -662,7 +662,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
662
662
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
663
663
  },
664
664
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
665
- id: 117,
665
+ id: 529,
666
666
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
667
667
  title: 'Jolokia Exposed',
668
668
  description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -684,7 +684,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
684
684
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
685
685
  },
686
686
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
687
- id: 118,
687
+ id: 530,
688
688
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
689
689
  title: 'SVN Working Copy Database Exposed',
690
690
  description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -706,7 +706,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
706
706
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
707
707
  },
708
708
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
709
- id: 119,
709
+ id: 531,
710
710
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
711
711
  title: 'Subversion Repository Detected',
712
712
  description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -728,7 +728,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
728
728
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
729
729
  },
730
730
  [error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
731
- id: 120,
731
+ id: 532,
732
732
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
733
733
  title: 'Mercurial Repository Found',
734
734
  description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -750,7 +750,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
750
750
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
751
751
  },
752
752
  [error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
753
- id: 121,
753
+ id: 533,
754
754
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
755
755
  title: 'Mercurial Hgrc Exposed',
756
756
  description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -772,7 +772,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
772
772
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
773
773
  },
774
774
  [error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
775
- id: 122,
775
+ id: 534,
776
776
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
777
777
  title: 'CVS Root Exposed',
778
778
  description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -794,7 +794,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
794
794
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
795
795
  },
796
796
  [error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
797
- id: 123,
797
+ id: 535,
798
798
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
799
799
  title: 'CVS Entries Exposed',
800
800
  description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -816,7 +816,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
816
816
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
817
817
  },
818
818
  [error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
819
- id: 124,
819
+ id: 536,
820
820
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
821
821
  title: 'Bazaar Repo Exposed',
822
822
  description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -838,7 +838,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
838
838
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
839
839
  },
840
840
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
841
- id: 125,
841
+ id: 537,
842
842
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
843
843
  title: 'Spring Boot Thread Dump Exposed',
844
844
  description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -860,7 +860,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
860
860
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
861
861
  },
862
862
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
863
- id: 126,
863
+ id: 538,
864
864
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
865
865
  title: 'Redis Rdb Dump Detected',
866
866
  description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -882,7 +882,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
882
882
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
883
883
  },
884
884
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
885
- id: 127,
885
+ id: 539,
886
886
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
887
887
  title: 'Atlassian Bitbucket Pipelines Configuration Detected',
888
888
  description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -904,7 +904,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
904
904
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
905
905
  },
906
906
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
907
- id: 128,
907
+ id: 540,
908
908
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
909
909
  title: 'AZURE Pipelines Configuration Detected',
910
910
  description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -926,7 +926,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
926
926
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
927
927
  },
928
928
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
929
- id: 129,
929
+ id: 541,
930
930
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
931
931
  title: 'AWS Code Build Buildspec Detected',
932
932
  description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -948,7 +948,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
948
948
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
949
949
  },
950
950
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
951
- id: 130,
951
+ id: 542,
952
952
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
953
953
  title: 'Github Actions Workflow Detected',
954
954
  description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -970,7 +970,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
970
970
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
971
971
  },
972
972
  [error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
973
- id: 131,
973
+ id: 543,
974
974
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
975
975
  title: 'Docker Compose Configuration Detected',
976
976
  description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -992,7 +992,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
992
992
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
993
993
  },
994
994
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
995
- id: 132,
995
+ id: 544,
996
996
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD,
997
997
  title: 'Trace Axd',
998
998
  description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1014,7 +1014,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1014
1014
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1015
1015
  },
1016
1016
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
1017
- id: 133,
1017
+ id: 545,
1018
1018
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
1019
1019
  title: 'Elmah Axd Exposed',
1020
1020
  description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1036,7 +1036,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1036
1036
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1037
1037
  },
1038
1038
  [error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
1039
- id: 134,
1039
+ id: 546,
1040
1040
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
1041
1041
  title: 'Laravel Log Viewer Enabled',
1042
1042
  description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1058,7 +1058,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1058
1058
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1059
1059
  },
1060
1060
  [error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
1061
- id: 135,
1061
+ id: 547,
1062
1062
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
1063
1063
  title: 'Apache Htaccess File Detected',
1064
1064
  description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1080,7 +1080,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1080
1080
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1081
1081
  },
1082
1082
  [error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
1083
- id: 136,
1083
+ id: 548,
1084
1084
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
1085
1085
  title: 'Apache Server Info Exposed',
1086
1086
  description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1102,7 +1102,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1102
1102
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1103
1103
  },
1104
1104
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
1105
- id: 137,
1105
+ id: 549,
1106
1106
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
1107
1107
  title: 'Sqlite Database Detected',
1108
1108
  description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1124,7 +1124,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1124
1124
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1125
1125
  },
1126
1126
  [error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
1127
- id: 138,
1127
+ id: 550,
1128
1128
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
1129
1129
  title: 'Package Dependencies Detected',
1130
1130
  description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1146,7 +1146,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1146
1146
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1147
1147
  },
1148
1148
  [error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
1149
- id: 139,
1149
+ id: 551,
1150
1150
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
1151
1151
  title: 'PHP Composer Dependencies Detected',
1152
1152
  description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1168,7 +1168,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1168
1168
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1169
1169
  },
1170
1170
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
1171
- id: 140,
1171
+ id: 552,
1172
1172
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
1173
1173
  title: 'Python Requirements Detected',
1174
1174
  description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1190,7 +1190,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1190
1190
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1191
1191
  },
1192
1192
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
1193
- id: 141,
1193
+ id: 553,
1194
1194
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
1195
1195
  title: 'AWS Config Exposed',
1196
1196
  description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1212,7 +1212,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1212
1212
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1213
1213
  },
1214
1214
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
1215
- id: 142,
1215
+ id: 554,
1216
1216
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
1217
1217
  title: 'AZURE Credentials Exposed',
1218
1218
  description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1234,7 +1234,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1234
1234
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1235
1235
  },
1236
1236
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
1237
- id: 143,
1237
+ id: 555,
1238
1238
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
1239
1239
  title: 'Helm Values Exposed',
1240
1240
  description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1256,7 +1256,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1256
1256
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1257
1257
  },
1258
1258
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
1259
- id: 144,
1259
+ id: 556,
1260
1260
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
1261
1261
  title: 'SSH Public Key Exposed',
1262
1262
  description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1278,7 +1278,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1278
1278
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1279
1279
  },
1280
1280
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
1281
- id: 145,
1281
+ id: 557,
1282
1282
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
1283
1283
  title: 'SSL Certificate Exposed',
1284
1284
  description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1300,7 +1300,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1300
1300
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1301
1301
  },
1302
1302
  [error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
1303
- id: 146,
1303
+ id: 558,
1304
1304
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
1305
1305
  title: 'Graph Ql Endpoint Exposed',
1306
1306
  description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1322,7 +1322,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1322
1322
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1323
1323
  },
1324
1324
  [error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
1325
- id: 147,
1325
+ id: 559,
1326
1326
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
1327
1327
  title: 'Graphi Ql Exposed',
1328
1328
  description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1344,7 +1344,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1344
1344
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1345
1345
  },
1346
1346
  [error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
1347
- id: 148,
1347
+ id: 560,
1348
1348
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
1349
1349
  title: 'Terraform Lock Exposed',
1350
1350
  description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1366,7 +1366,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1366
1366
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1367
1367
  },
1368
1368
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
1369
- id: 149,
1369
+ id: 561,
1370
1370
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
1371
1371
  title: 'Terraform Vars Exposed',
1372
1372
  description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1388,7 +1388,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1388
1388
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1389
1389
  },
1390
1390
  [error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
1391
- id: 150,
1391
+ id: 562,
1392
1392
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
1393
1393
  title: 'Error Log Exposed',
1394
1394
  description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1410,7 +1410,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1410
1410
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1411
1411
  },
1412
1412
  [error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
1413
- id: 151,
1413
+ id: 563,
1414
1414
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
1415
1415
  title: 'Access Log Exposed',
1416
1416
  description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1432,7 +1432,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1432
1432
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1433
1433
  },
1434
1434
  [error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
1435
- id: 152,
1435
+ id: 564,
1436
1436
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
1437
1437
  title: 'Debug Log Exposed',
1438
1438
  description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1454,7 +1454,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1454
1454
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1455
1455
  },
1456
1456
  [error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
1457
- id: 153,
1457
+ id: 565,
1458
1458
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
1459
1459
  title: 'Application Log Exposed',
1460
1460
  description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1476,7 +1476,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1476
1476
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1477
1477
  },
1478
1478
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
1479
- id: 154,
1479
+ id: 566,
1480
1480
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
1481
1481
  title: 'Laravel Log Exposed',
1482
1482
  description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1498,7 +1498,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1498
1498
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1499
1499
  },
1500
1500
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
1501
- id: 155,
1501
+ id: 567,
1502
1502
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
1503
1503
  title: 'Word Press Debug Log Exposed',
1504
1504
  description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1520,7 +1520,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1520
1520
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1521
1521
  },
1522
1522
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
1523
- id: 156,
1523
+ id: 568,
1524
1524
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
1525
1525
  title: 'Adminer Exposed',
1526
1526
  description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1542,7 +1542,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1542
1542
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1543
1543
  },
1544
1544
  [error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
1545
- id: 157,
1545
+ id: 569,
1546
1546
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
1547
1547
  title: 'WSDL Exposed',
1548
1548
  description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1564,7 +1564,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1564
1564
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1565
1565
  },
1566
1566
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
1567
- id: 158,
1567
+ id: 570,
1568
1568
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
1569
1569
  title: 'Debug Endpoint Exposed',
1570
1570
  description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1586,7 +1586,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1586
1586
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1587
1587
  },
1588
1588
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
1589
- id: 159,
1589
+ id: 571,
1590
1590
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
1591
1591
  title: 'Go Debug Vars Exposed',
1592
1592
  description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1608,7 +1608,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1608
1608
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1609
1609
  },
1610
1610
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
1611
- id: 160,
1611
+ id: 572,
1612
1612
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
1613
1613
  title: 'Go Pprof Exposed',
1614
1614
  description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1630,7 +1630,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1630
1630
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1631
1631
  },
1632
1632
  [error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
1633
- id: 161,
1633
+ id: 573,
1634
1634
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
1635
1635
  title: 'Word Press XML Rpc Exposed',
1636
1636
  description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1652,7 +1652,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1652
1652
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1653
1653
  },
1654
1654
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
1655
- id: 162,
1655
+ id: 574,
1656
1656
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
1657
1657
  title: 'Test Endpoint Exposed',
1658
1658
  description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1674,7 +1674,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1674
1674
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1675
1675
  },
1676
1676
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
1677
- id: 163,
1677
+ id: 575,
1678
1678
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
1679
1679
  title: 'Staging Endpoint Exposed',
1680
1680
  description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1696,7 +1696,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1696
1696
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1697
1697
  },
1698
1698
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
1699
- id: 164,
1699
+ id: 576,
1700
1700
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
1701
1701
  title: 'Editor Backup File Detected',
1702
1702
  description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1718,7 +1718,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1718
1718
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1719
1719
  },
1720
1720
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
1721
- id: 165,
1721
+ id: 577,
1722
1722
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
1723
1723
  title: 'VIM Swap File Detected',
1724
1724
  description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1740,7 +1740,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1740
1740
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1741
1741
  },
1742
1742
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
1743
- id: 166,
1743
+ id: 578,
1744
1744
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
1745
1745
  title: 'Directory Listing Enabled',
1746
1746
  description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1762,7 +1762,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1762
1762
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1763
1763
  },
1764
1764
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
1765
- id: 167,
1765
+ id: 579,
1766
1766
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
1767
1767
  title: 'AZURE Storage Config Exposed',
1768
1768
  description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1784,7 +1784,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1784
1784
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1785
1785
  },
1786
1786
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
1787
- id: 168,
1787
+ id: 580,
1788
1788
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
1789
1789
  title: 'Mongo Rc Exposed',
1790
1790
  description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1806,7 +1806,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1806
1806
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1807
1807
  },
1808
1808
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
1809
- id: 169,
1809
+ id: 581,
1810
1810
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
1811
1811
  title: 'Awssam Template Exposed',
1812
1812
  description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1828,7 +1828,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1828
1828
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1829
1829
  },
1830
1830
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
1831
- id: 170,
1831
+ id: 582,
1832
1832
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
1833
1833
  title: 'Serverless Config Exposed',
1834
1834
  description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
@@ -1850,7 +1850,7 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1850
1850
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1851
1851
  },
1852
1852
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
1853
- id: 171,
1853
+ id: 583,
1854
1854
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
1855
1855
  title: 'Cloud Formation Template Exposed',
1856
1856
  description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',