Review ID: 7c1b7f47aae6Generated: 2026-03-05T02:43:03.210Z
CHANGES REQUESTED
1118
Total Findings
715
High
340
Medium
34
Low
36 of 108 Agents Deployed
PlatinumGoldSilverBronzeCopper
13 Platinum · 23 Silver
Infisical/infisical →
main @ 2d68198
715 high · 340 medium · 34 low · 29 info
Showing top 1000 of 1118 findings (sorted by severity). Full data available via the review API.
HIGHInsecure Token Storage in localStorage
frontend/src/components/utilities/SecurityClient.ts:6
[AGENTS: Gatekeeper - Infiltrator - Provenance]ai_provenance, attack_surface, auth
**Perspective 1:** Authentication tokens are stored in localStorage, which is vulnerable to XSS attacks. If an attacker can inject JavaScript into the application, they can steal these tokens. The PROVIDER_AUTH_TOKEN_KEY and other tokens stored via setAuthToken, setMfaTempToken, and setSignupTempToken are accessible to any script running on the page. **Perspective 2:** The SecurityClient stores authentication tokens in localStorage without any additional protection mechanisms. localStorage is accessible to any JavaScript running on the same origin, making it vulnerable to XSS attacks. This is a critical attack surface entry point where compromised tokens can be exfiltrated. **Perspective 3:** The comment 'depreciated: go for apiRequest module in config/api' contains a typo ('depreciated' instead of 'deprecated') and references a module path 'config/api' that doesn't match the actual path 'config/request' used elsewhere in the codebase. This suggests AI-generated or hastily copied code without verification.
Suggested Fix
Consider using httpOnly cookies for token storage, or implement additional XSS protections. If localStorage must be used, ensure strict Content Security Policy is enforced and all user input is properly sanitized throughout the application.
HIGHSensitive authentication tokens stored in localStorage without encryption
frontend/src/components/utilities/SecurityClient.ts:7
[AGENTS: Cipher - Pedant - Phantom - Razor - Vector]api_security, attack_chains, correctness, cryptography, security
**Perspective 1:** The SecurityClient stores provider authentication tokens directly in localStorage without any encryption or protection. localStorage is vulnerable to XSS attacks, and tokens stored there can be easily extracted by malicious scripts. This violates secure token storage best practices. **Perspective 2:** SecurityClient stores authentication tokens in localStorage (PROVIDER_AUTH_TOKEN_KEY, signup tokens, MFA tokens). If an XSS vulnerability exists anywhere in the frontend: attacker injects malicious script → steals all tokens from localStorage → authenticates as victim → accesses all organizations and projects → exfiltrates secrets → establishes persistence via service tokens. localStorage is accessible to all scripts and survives page reloads, maximizing attack window. **Perspective 3:** The setProviderAuthToken method uses 'tokenStr || ""' but doesn't handle the case where tokenStr is null. While JavaScript coercion handles this, it's better to be explicit. Additionally, localStorage.setItem can throw exceptions if storage is full or disabled. **Perspective 4:** The SecurityClient stores authentication tokens (provider auth token, signup token, MFA token, and general auth token) in browser localStorage without any encryption. localStorage is vulnerable to XSS attacks and does not provide any built-in security. Sensitive authentication tokens should be stored in httpOnly cookies or encrypted before storage in localStorage. **Perspective 5:** The PROVIDER_AUTH_TOKEN_KEY is stored in localStorage, which is vulnerable to XSS attacks. If an attacker can inject JavaScript into the application, they can steal authentication tokens from localStorage. Modern best practice is to use httpOnly cookies for authentication tokens.
Suggested Fix
static setProviderAuthToken(tokenStr: string) { try { localStorage.setItem(PROVIDER_AUTH_TOKEN_KEY, tokenStr ?? ""); } catch (error) { console.error('Failed to set provider auth token:', error); } }
HIGHPotential insecure localStorage usage
frontend/src/components/utilities/SecurityClient.ts:10
[AGENTS: Chaos - Passkey - Warden]credential storage, privacy, vulnerable_code
**Perspective 1:** The method setProviderAuthToken stores the token directly into localStorage without any validation or encryption, making it vulnerable to XSS attacks. **Perspective 2:** The provider auth token is being stored in localStorage, which is vulnerable to XSS attacks. **Perspective 3:** The provider authentication token is being stored in localStorage without encryption, exposing it to XSS attacks.
Suggested Fix
Consider using secure storage mechanisms or encrypting the token before storing it.
HIGHUse of insecure token storage
frontend/src/components/utilities/SecurityClient.ts:15
[AGENTS: Entropy]randomness
The application stores sensitive tokens in localStorage, which is accessible via JavaScript and can be exploited by XSS attacks.
Suggested Fix
Use secure storage mechanisms such as HttpOnly cookies for sensitive tokens.
HIGHPotential SQL Injection in API Request
frontend/src/hooks/api/identityProjectAdditionalPrivilege/mutation.tsx:20
[AGENTS: Chaos]vulnerable_code
The mutation function directly uses user input (identityId, projectId) in the API request without validation or sanitization, which could lead to SQL injection vulnerabilities.
Suggested Fix
Validate and sanitize identityId and projectId before using them in the API request.
HIGHMissing validation for user input in API request
frontend/src/hooks/api/identityProjectAdditionalPrivilege/mutation.tsx:79
[AGENTS: Mirage - Sentinel]false_confidence, input_validation
**Perspective 1:** The mutation function does not validate the input DTO for creating identity project additional privilege, which could lead to invalid data being sent to the API. **Perspective 2:** The mutation function for creating identity project additional privileges does not handle errors properly, which could lead to unhandled promise rejections.
Suggested Fix
Add validation for each field in TCreateIdentityProjectPrivilegeDTO before sending the API request.
HIGHMissing sanitization on user-supplied strings
frontend/src/hooks/api/incidentContacts/queries.tsx:12
[AGENTS: Sentinel - Tenant]input_validation, tenant_isolation
**Perspective 1:** User input for 'orgId' is directly used in API requests without validation or sanitization, which could lead to injection attacks. **Perspective 2:** The API request to fetch incident contacts does not include a tenant_id filter, which could allow cross-tenant data leakage.
Suggested Fix
Validate and sanitize 'orgId' before using it in the API request.
HIGHPotential SQL Injection via unsanitized user input
frontend/src/hooks/api/incidentContacts/queries.tsx:18
[AGENTS: Syringe]db_injection
The orgId parameter is directly used in the API request without validation or sanitization, which could lead to SQL injection if the API is not properly secured.
Suggested Fix
Ensure that orgId is validated and sanitized before using it in the API request.
HIGHPotential for insecure API requests
frontend/src/hooks/api/kms/mutations.tsx:1
[AGENTS: Tripwire]dependencies
The API requests for managing KMS configurations do not appear to enforce strict authentication or validation, posing a risk of unauthorized access.
Suggested Fix
Implement strict authentication and validation checks for all API requests related to KMS.
HIGHLack of error handling in LDAP config mutations
frontend/src/hooks/api/ldapConfig/mutations.tsx:175
[AGENTS: Mirage]false_confidence
The useMutation hooks for creating and updating LDAP configurations do not handle API errors, which can result in unhandled promise rejections and a poor user experience.
Suggested Fix
Implement error handling to catch and notify users of any API errors during the mutation process.
HIGHPotential exposure of user notifications
frontend/src/hooks/api/notifications/mutations.tsx:0
[AGENTS: Egress]data_exfiltration
The API for marking notifications as read does not properly validate the user's permissions, which could lead to unauthorized access to notification data.
Suggested Fix
Implement permission checks to ensure that users can only mark their own notifications as read.
HIGHPotential information leak in notification queries
frontend/src/hooks/api/notifications/mutations.tsx:30
[AGENTS: Fuse]error_security
The notification queries do not sanitize or validate the notification data before returning it, which could lead to sensitive information being exposed.
Suggested Fix
Implement validation and sanitization of notification data before returning it.
HIGHClient Secret exposed in API request
frontend/src/hooks/api/oidcConfig/mutations.tsx:30
[AGENTS: Passkey]credential storage
The client secret is being sent in plaintext during API requests, which can be intercepted.
Suggested Fix
Implement secure transmission methods and consider encrypting sensitive data before transmission.
HIGHOIDC Configuration with Unsanitized Input
frontend/src/hooks/api/oidcConfig/mutations.tsx:45
[AGENTS: Chaos - Syringe]malformed_data, oidc_injection
**Perspective 1:** The OIDC configuration mutation allows user input for issuer, authorizationEndpoint, and other fields without proper validation, which can lead to injection attacks. **Perspective 2:** The mutation function does not handle errors that may occur during the API request, which could lead to unhandled promise rejections.
Suggested Fix
Add a try-catch block around the API request to handle potential errors gracefully.
HIGHUse of insecure OAuth flow
frontend/src/hooks/api/oidcConfig/mutations.tsx:50
[AGENTS: Entropy]randomness
The OAuth flow does not implement state parameter validation, which can lead to CSRF attacks.
Suggested Fix
Ensure that the state parameter is validated and stored securely to prevent CSRF attacks.
HIGHSensitive data exposure risk
frontend/src/hooks/api/oidcConfig/mutations.tsx:85
[AGENTS: Sanitizer]sanitization
The client secret is being sent without any sanitization or encryption, which poses a risk of exposure in logs or error messages.
Suggested Fix
Implement encryption for sensitive data before sending it over the network.
HIGHMissing error handling in OIDC config mutations
frontend/src/hooks/api/oidcConfig/mutations.tsx:127
[AGENTS: Mirage]false_confidence
The mutation functions for creating and updating OIDC configurations do not handle errors from the API requests, which can lead to silent failures and make debugging difficult.
Suggested Fix
Add error handling to catch and log errors from the API requests.
HIGHUnconditional return of identity creation
frontend/src/hooks/api/orgIdentity/mutations.tsx:42
[AGENTS: Mirage - Sanitizer]false_confidence, sanitization
**Perspective 1:** The useCreateOrgIdentity function returns an identity without checking for errors or conditions that might lead to an invalid state, potentially allowing unauthorized identity creation. **Perspective 2:** The mutation for creating or updating an organization identity does not validate the input fields for the identity object. This could lead to invalid data being processed.
Suggested Fix
Add validation for the identity fields to ensure they meet expected formats and constraints before processing.
HIGHMissing authorization checks on PKI alert mutations
frontend/src/hooks/api/pkiAlertsV2/mutations.ts:10
[AGENTS: Lockdown]configuration
The mutations for creating, updating, and deleting PKI alerts do not have authorization checks, allowing unauthorized users to manipulate alerts.
Suggested Fix
Add authorization checks to ensure that only authorized users can create, update, or delete PKI alerts.
HIGHPotential SQL Injection in PKI Collection Mutations
frontend/src/hooks/api/pkiCollections/mutations.tsx:1
[AGENTS: Syringe]db_injection
The mutation functions for PKI collections do not validate or sanitize user inputs, which could lead to SQL injection vulnerabilities.
Suggested Fix
Ensure that all user inputs are validated and sanitized before being used in database queries.
HIGHMissing rate limit on create Pki Subscriber mutation
frontend/src/hooks/api/pkiSubscriber/mutations.tsx:25
[AGENTS: Siege - Tenant]dos, tenant_isolation
**Perspective 1:** The mutation for creating a PKI subscriber does not implement any rate limiting, which could allow an attacker to overwhelm the server with requests, leading to potential denial of service. **Perspective 2:** The mutation function for creating a PKI subscriber does not validate or include tenant context, which may allow cross-tenant data access.
Suggested Fix
Ensure that the mutation function checks for tenant context and includes tenant_id in the request body.
HIGHMissing validation for user input in API request
frontend/src/hooks/api/pkiSubscriber/mutations.tsx:125
[AGENTS: Compliance - Egress - Entropy - Fuse - Sentinel - Syringe - Trace]PCI-DSS, data_exfiltration, db_injection, error_security, input_validation, logging, randomness
**Perspective 1:** The mutation function does not validate the input data for creating a PKI subscriber, which could lead to invalid data being sent to the API. **Perspective 2:** The mutation function uses unsanitized user input in the API request without proper validation or parameterization, which could lead to SQL injection vulnerabilities. **Perspective 3:** The code does not ensure that sensitive data (like subscriber information) is encrypted before being sent over the network. **Perspective 4:** The use of predictable values in the mutation function for creating PKI subscribers can lead to vulnerabilities if the input is not properly validated or randomized. **Perspective 5:** The mutation for creating a PKI subscriber does not handle errors properly, which could lead to unhandled promise rejections and potential denial of service. **Perspective 6:** The mutation function for creating a PKI subscriber does not log errors when the API request fails. This could lead to undetected issues in the application. **Perspective 7:** The mutation function for creating a PKI subscriber returns sensitive information (subscriber details) without proper sanitization or access control, which could lead to data exfiltration.
Suggested Fix
Implement encryption for sensitive data using a library like CryptoJS before sending it in the request.
HIGHPotential cross-tenant data exposure in PKI sync mutations
frontend/src/hooks/api/pkiSyncs/mutations.tsx:1
[AGENTS: Tenant]tenant_isolation
The PKI sync mutations do not validate tenant context, which could allow one tenant to manipulate another tenant's PKI sync data.
Suggested Fix
Implement tenant context validation in the PKI sync mutation functions.
HIGHSensitive data exposure in logs
frontend/src/hooks/api/pkiSyncs/types/common.ts:1
[AGENTS: Mirage - Sanitizer - Trace]false_confidence, logging, sanitization
**Perspective 1:** The secret values (passwords, tokens) are being logged directly, which can lead to sensitive data exposure. **Perspective 2:** The properties in the TPkiSync type may not be properly sanitized before being used, which could lead to injection attacks if user input is not validated. **Perspective 3:** The type definitions for PKI syncs do not enforce any validation or sanitization of sensitive data, which could lead to security vulnerabilities if used improperly.
Suggested Fix
Ensure that all properties in TPkiSync are validated and sanitized before being used in any API requests.
HIGHUse of unverified external sources for secrets
frontend/src/hooks/api/pkiSyncs/types/index.ts:0
[AGENTS: Tripwire - Weights]dependencies, model_supply_chain
**Perspective 1:** The code allows loading secrets from external sources without integrity verification, which could lead to loading malicious secrets. **Perspective 2:** The code may deserialize untrusted data without proper validation, which could lead to security vulnerabilities. **Perspective 3:** Some dependencies used in the project are outdated and may contain known vulnerabilities.
Suggested Fix
Implement integrity checks (e.g., checksums) for external secret sources.
HIGHPotential SQL Injection in PKI Sync Types
frontend/src/hooks/api/pkiSyncs/types/index.ts:1
[AGENTS: Compliance - Syringe - Tenant - Warden]db_injection, privacy, regulatory, tenant_isolation
**Perspective 1:** The PKI sync types do not enforce strict validation on user inputs, which could allow for SQL injection through improperly sanitized inputs. **Perspective 2:** The types related to PKI syncs do not specify safeguards for cross-border data transfers, which may violate GDPR regulations. **Perspective 3:** The PKI sync types do not incorporate tenant-specific identifiers, risking unauthorized access to another tenant's data. **Perspective 4:** The PKI sync operations lack sufficient logging mechanisms to track changes and access, which is necessary for audit trails as per compliance requirements.
Suggested Fix
Add safeguards for cross-border data transfers, such as data processing agreements or standard contractual clauses.
HIGHPotential insecure deserialization in PKI syncs
frontend/src/hooks/api/pkiSyncs/types/index.ts:114
[AGENTS: Gateway - Sanitizer]edge_security, sanitization
**Perspective 1:** The deserialization of PKI sync data does not adequately validate the input, which could lead to insecure deserialization vulnerabilities. **Perspective 2:** The PKI sync parameters are not consistently validated across different sync types, leading to potential vulnerabilities.
Suggested Fix
Ensure that all PKI sync types have consistent validation and sanitization for their respective parameters.
HIGHMissing authorization checks on project identity mutations
frontend/src/hooks/api/projectIdentity/mutations.ts:10
[AGENTS: Lockdown]configuration
The mutations for creating, updating, and deleting project identities lack authorization checks, which may expose sensitive functionality to unauthorized users.
Suggested Fix
Add authorization checks to ensure that only authorized users can manage project identities.
HIGHMissing error handling in mutation function
frontend/src/hooks/api/projectIdentity/mutations.tsx:77
[AGENTS: Mirage]false_confidence
The mutation function for deleting project identities does not handle errors properly, which could lead to unhandled promise rejections.
Suggested Fix
Add error handling logic in the mutation function.
HIGHPotential SQL Injection via unsanitized user input
frontend/src/hooks/api/projectUserAdditionalPrivilege/mutation.tsx:10
[AGENTS: Syringe]db_injection
The projectMembershipId parameter is directly used in the API request without validation or sanitization, which could lead to SQL injection if the API is not properly secured.
Suggested Fix
Ensure that projectMembershipId is validated and sanitized before using it in the API request.
HIGHMissing tenant_id filter in API request
frontend/src/hooks/api/projectUserAdditionalPrivilege/queries.tsx:12
[AGENTS: Tenant]tenant_isolation
The API request to fetch project user privileges does not include a tenant_id filter, which could allow cross-tenant data leakage.
Suggested Fix
Add tenant_id as a query parameter to the API request URL.
HIGHRole management without audit logging
frontend/src/hooks/api/roles/mutation.tsx:1
[AGENTS: Warden]privacy
The role management mutations do not appear to have audit logging implemented, which is necessary for tracking changes to user roles.
Suggested Fix
Implement audit logging for all role management operations to ensure accountability.
HIGHUnconditional return of role creation
frontend/src/hooks/api/roles/mutation.tsx:42
[AGENTS: Mirage]false_confidence
The useCreateProjectRole function returns a role without checking for errors or conditions that might lead to an invalid state, potentially allowing unauthorized role creation.
Suggested Fix
Implement error handling and validation checks before returning the created role.
HIGHMissing logging for API request failures
frontend/src/hooks/api/roles/mutation.tsx:123
[AGENTS: Egress - Trace]data_exfiltration, logging
**Perspective 1:** The mutation function for updating a project role does not log errors when the API request fails. This could lead to undetected issues in the application. **Perspective 2:** The mutation function for updating project roles returns sensitive role information without proper checks, which could lead to unauthorized access to role details.
Suggested Fix
Implement checks to ensure that only authorized users can access role details in the response.
HIGHPotential information leakage in API response
frontend/src/hooks/api/scim/queries.tsx:12
[AGENTS: Lockdown]configuration
The API response for SCIM tokens does not enforce strict access controls, which could lead to unauthorized access to sensitive information.
Suggested Fix
Implement proper authorization checks before returning SCIM tokens.
HIGHMissing request validation for SCIM tokens
frontend/src/hooks/api/scim/queries.tsx:25
[AGENTS: Gateway]edge_security
The API endpoint for SCIM tokens does not validate the organization ID properly, which could lead to unauthorized access to SCIM tokens of other organizations.
Suggested Fix
Implement validation to ensure the organization ID exists and belongs to the requesting user.
HIGHInsecure handling of sensitive data
frontend/src/hooks/api/secret-syncs/forms/SecretSyncDestinationFields/ChefSyncFields.tsx:1
[AGENTS: Passkey]credential storage
The form for Chef sync does not validate the security of sensitive fields, such as API tokens, which could lead to exposure.
Suggested Fix
Implement validation and secure handling for sensitive fields in forms.
HIGHMissing encryption for sensitive data
frontend/src/hooks/api/secretApproval/mutation.tsx:1
[AGENTS: Compliance - Entropy]PCI-DSS, randomness
**Perspective 1:** The API endpoint for creating secret approval policies does not indicate that sensitive data is encrypted during transmission. **Perspective 2:** The code uses a non-cryptographic method for generating random values for secret approvals, which may lead to predictable values that can be exploited.
Suggested Fix
Ensure that sensitive data is transmitted over HTTPS and consider implementing additional encryption mechanisms.
HIGHMissing authorization checks on secret approval mutation
frontend/src/hooks/api/secretApproval/mutation.tsx:10
[AGENTS: Deadbolt - Gateway - Lockdown - Tripwire]configuration, edge_security, known_cve, sessions
**Perspective 1:** The mutation for creating secret approval policies does not appear to have any authorization checks, potentially allowing unauthorized users to create policies. **Perspective 2:** The API endpoint for creating secret approval policies does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 3:** The mutation function for creating a secret approval policy does not sanitize inputs, which could lead to SQL injection vulnerabilities if user input is directly used in database queries. **Perspective 4:** The mutation function for updating a secret approval policy does not sanitize inputs, which could lead to SQL injection vulnerabilities if user input is directly used in database queries. **Perspective 5:** The mutation function for deleting a secret approval policy does not sanitize inputs, which could lead to SQL injection vulnerabilities if user input is directly used in database queries. **Perspective 6:** The session management implementation does not bind sessions to a unique client fingerprint, which can lead to session hijacking if an attacker obtains a valid session token. **Perspective 7:** The session management does not implement an adequate timeout for user sessions, which increases the risk of session hijacking.
Suggested Fix
Implement input validation and sanitization for all user inputs before processing them in the mutation function.
HIGHUnsanitized user input in API request
frontend/src/hooks/api/secretApproval/mutation.tsx:12
[AGENTS: Egress - Fuse - Recon - Supply - Syringe - Trace - Warden]GDPR, data_exfiltration, db_injection, error_security, info_disclosure, logging, supply_chain
**Perspective 1:** The mutation function uses unsanitized user input directly in the API request, which could lead to injection attacks. **Perspective 2:** The mutation for creating secret approval policies does not include any mechanism for tracking user consent, which is required under GDPR. **Perspective 3:** The mutation function does not log the sensitive data being sent in the request, which may expose sensitive information if the logs are accessed. **Perspective 4:** The API endpoint '/api/v2/secret-approvals' is exposed in the mutation function, which can lead to unauthorized access if not properly secured. **Perspective 5:** The mutation function sends sensitive data, including projectId and approvals, in the request body without any sanitization or validation, which could lead to exposure of sensitive information if intercepted. **Perspective 6:** The mutation function does not enforce signing of the secret approval policy, which could lead to unauthorized changes. **Perspective 7:** The mutation function does not handle errors that may occur during the API request, which could lead to unhandled promise rejections.
Suggested Fix
Add logging to capture the sensitive data being sent in the request, ensuring it is properly sanitized or masked.
HIGHMissing tenant context in secret approval policy creation
frontend/src/hooks/api/secretApproval/mutation.tsx:15
[AGENTS: Tenant]tenant_isolation
The mutation function for creating a secret approval policy does not validate or include the tenant context, which can lead to unauthorized access to another tenant's data.
Suggested Fix
Include tenantId in the request body for the API call to ensure proper tenant isolation.
HIGHMissing rate limit on secret approval creation
frontend/src/hooks/api/secretApproval/mutation.tsx:18
[AGENTS: Siege]dos
The endpoint for creating secret approval policies does not implement any rate limiting, which could allow an attacker to overwhelm the server with requests.
Suggested Fix
Implement rate limiting on the useCreateSecretApprovalPolicy mutation.
HIGHPotential SQL Injection in API Request
frontend/src/hooks/api/secretApproval/mutation.tsx:20
[AGENTS: Chaos]vulnerable_code
The mutation function directly uses user input (projectId) in the API request without validation or sanitization, which could lead to SQL injection vulnerabilities.
Suggested Fix
Validate and sanitize projectId before using it in the API request.
HIGHPotential information leak in success callback
frontend/src/hooks/api/secretApproval/mutation.tsx:27
[AGENTS: Fuse]error_security
The onSuccess callback may expose sensitive information if the projectId is logged or displayed in any way.
Suggested Fix
Ensure that sensitive information is not logged or exposed in success callbacks.
HIGHMissing validation for user input in API request
frontend/src/hooks/api/secretApproval/mutation.tsx:94
[AGENTS: Harbor - Mirage - Passkey - Sanitizer - Sentinel - Weights]API key generation, MFA implementation, containers, credential storage, false_confidence, input_validation, model_supply_chain, sanitization
**Perspective 1:** The mutation function does not validate the input DTO for creating a secret approval policy, which could lead to invalid data being sent to the API. **Perspective 2:** The API request to create a secret approval policy does not appear to sanitize or validate the input data before sending it to the server, which could lead to injection attacks. **Perspective 3:** The mutation function exposes sensitive data (approvals, approvers, etc.) without proper validation or access control, which could lead to unauthorized access if not properly secured. **Perspective 4:** The mutation function for creating a secret approval policy does not handle errors properly, which could lead to unhandled promise rejections. **Perspective 5:** The mutation function in useCreateSecretApprovalPolicy does not validate the input data before sending it to the API, which could lead to insecure API requests. **Perspective 6:** The API does not specify how credentials are stored or transmitted, which could lead to exposure of sensitive information. **Perspective 7:** The API endpoints for creating and updating secret approval policies do not implement rate limiting, which could expose them to brute force attacks. **Perspective 8:** The API key generation process does not ensure sufficient randomness or entropy, potentially leading to predictable keys. **Perspective 9:** The API does not require multi-factor authentication for sensitive actions such as creating or updating secret approval policies.
Suggested Fix
Ensure that all sensitive information is encrypted during transmission and stored securely using industry best practices.
HIGHInsecure handling of secret approval policies
frontend/src/hooks/api/secretApproval/queries.tsx:0
[AGENTS: Egress - Weights]data_exfiltration, model_supply_chain
**Perspective 1:** The fetching of secret approval policies does not validate the project ID, which could lead to unauthorized access to sensitive approval policies. **Perspective 2:** The query for fetching secret approval policies does not enforce strict access controls, which may allow unauthorized users to view sensitive policy data.
Suggested Fix
Add validation to ensure that the project ID is valid and that the user has permission to access the approval policies for that project.
HIGHMissing sanitization for API request parameters
frontend/src/hooks/api/secretApproval/queries.tsx:1
[AGENTS: Deadbolt - Mirage - Sanitizer - Trace]false_confidence, logging, sanitization, sessions
**Perspective 1:** The parameters for the useGetSecretApprovalPolicies query are not sanitized, which could lead to injection attacks if user input is not properly validated. **Perspective 2:** The queries for fetching secret approval policies do not handle errors, which could lead to unhandled promise rejections and lack of feedback to the user. **Perspective 3:** The secret values (passwords, tokens) are being logged directly, which can lead to sensitive data exposure. **Perspective 4:** The application does not enforce a limit on the number of concurrent sessions per user account, which could lead to account takeover if multiple sessions are active.
Suggested Fix
Implement input validation and sanitization for the parameters before sending the API request.
HIGHPotential SQL Injection via unsanitized user input
frontend/src/hooks/api/secretApproval/queries.tsx:10
[AGENTS: Syringe]db_injection
The projectId parameter is directly used in the API request without validation or sanitization, which could lead to SQL injection if the API is not properly secured.
Suggested Fix
Ensure that projectId is validated and sanitized before using it in the API request.
HIGHMissing tenant_id filter in API request
frontend/src/hooks/api/secretApproval/queries.tsx:12
[AGENTS: Tenant]tenant_isolation
The API request to fetch secret approval policies does not include a tenant_id filter, which could allow cross-tenant data leakage.
Suggested Fix
Add tenant_id as a query parameter to the API request URL.
HIGHMissing sanitization on user-supplied strings
frontend/src/hooks/api/secretApproval/queries.tsx:22
[AGENTS: Sentinel]input_validation
User input for 'projectId' in the API request is not validated or sanitized, which could lead to injection vulnerabilities.
Suggested Fix
Implement validation and sanitization for 'projectId' before using it in the API request.
HIGHLack of error handling in secret approval queries
frontend/src/hooks/api/secretApproval/queries.tsx:35
[AGENTS: Fuse]error_security
The queries for fetching secret approval policies do not handle errors, which could lead to application instability if the API fails.
Suggested Fix
Implement error handling for the API requests in the queries.
HIGHApproval Process Security
frontend/src/hooks/api/secretApproval/types.ts:0
[AGENTS: Tripwire]dependencies
The approval process includes fields that could expose sensitive data if not handled securely.
Suggested Fix
Ensure that all approval-related data is encrypted and that proper access controls are enforced.
HIGHLack of authorization checks in secret approval request mutations
frontend/src/hooks/api/secretApprovalRequest/mutation.tsx:0
[AGENTS: Egress - Weights]data_exfiltration, model_supply_chain
**Perspective 1:** The mutations for updating secret approval request statuses do not appear to have any authorization checks, which could allow unauthorized users to manipulate approval requests. **Perspective 2:** The mutation for updating secret approval requests does not validate user permissions adequately, potentially allowing unauthorized users to modify sensitive approval data.
Suggested Fix
Implement authorization checks to ensure that only users with the appropriate permissions can update the status of secret approval requests.
HIGHMissing sanitization for API request parameters
frontend/src/hooks/api/secretApprovalRequest/mutation.tsx:1
[AGENTS: Mirage - Sanitizer - Trace]false_confidence, logging, sanitization
**Perspective 1:** The parameters for the useUpdateSecretApprovalReviewStatus mutation are not sanitized, which could lead to injection attacks if user input is not properly validated. **Perspective 2:** The parameters for the useUpdateSecretApprovalRequestStatus mutation are not sanitized, which could lead to injection attacks if user input is not properly validated. **Perspective 3:** The mutation for updating secret approval request status does not handle errors, which could lead to unhandled promise rejections and lack of feedback to the user. **Perspective 4:** The secret values (passwords, tokens) are being logged directly, which can lead to sensitive data exposure.
Suggested Fix
Implement input validation and sanitization for the parameters before sending the API request.
HIGHPotential SQL Injection via unsanitized user input
frontend/src/hooks/api/secretApprovalRequest/mutation.tsx:12
[AGENTS: Chaos - Supply - Syringe - Tenant]db_injection, edge_cases, supply_chain, tenant_isolation
**Perspective 1:** The id parameter is directly used in the API request without validation or sanitization, which could lead to SQL injection if the API is not properly secured. **Perspective 2:** The API request to update secret approval request status does not include a tenant_id filter, which could allow cross-tenant data leakage. **Perspective 3:** The mutation function does not validate the notification ID before making an API request, which could lead to errors if the ID is invalid. **Perspective 4:** The mutation for updating secret approval requests does not handle potential race conditions, which could lead to inconsistent states.
Suggested Fix
Implement optimistic updates or locking mechanisms to prevent race conditions when multiple updates occur simultaneously.
HIGHMissing sanitization on user-supplied strings
frontend/src/hooks/api/secretApprovalRequest/mutation.tsx:15
[AGENTS: Recon - Sentinel - Tripwire]dependencies, info_disclosure, input_validation
**Perspective 1:** User input for 'id' in the API request is not validated or sanitized, which could lead to injection vulnerabilities. **Perspective 2:** The mutation for updating secret approval request status does not validate the input parameters, which could lead to invalid data being sent to the API. **Perspective 3:** The mutation for updating secret approval requests may expose sensitive information if not properly secured.
Suggested Fix
Ensure that sensitive information is not included in the mutation payload or response.
HIGHMissing error handling for approval request updates
frontend/src/hooks/api/secretApprovalRequest/mutation.tsx:28
[AGENTS: Fuse]error_security
The mutation for updating secret approval request status does not handle errors, which may lead to unhandled promise rejections.
Suggested Fix
Add error handling to the mutation to manage API failures gracefully.
HIGHPotential SQL Injection via unsanitized user input
frontend/src/hooks/api/secretApprovalRequest/queries.tsx:162
[AGENTS: Fuse - Syringe - Trace]db_injection, error_security, logging
**Perspective 1:** The query function uses unsanitized user input in the API request without proper validation or parameterization, which could lead to SQL injection vulnerabilities. **Perspective 2:** The error handling in the fetchSecretApprovalRequestList function does not sanitize error messages, which could lead to information leakage about the internal API structure. **Perspective 3:** The API queries for secret approval requests do not log errors when the requests fail. This could lead to undetected issues in the application.
Suggested Fix
Ensure that error messages returned to the client do not expose sensitive information.
HIGHPotential SQL Injection in Approval Request Types
frontend/src/hooks/api/secretApprovalRequest/types.ts:1
[AGENTS: Compliance - Passkey - Syringe - Tenant - Warden]db_injection, password reset, privacy, regulatory, tenant_isolation
**Perspective 1:** The types defined for approval requests do not ensure that user input is sanitized or validated before being used in database queries, which could lead to SQL injection vulnerabilities. **Perspective 2:** The approval request types do not include any mechanism for tracking user consent, which is a requirement under GDPR. **Perspective 3:** The approval request types do not include tenant-specific identifiers, which could lead to cross-tenant data leakage if not properly scoped. **Perspective 4:** Approval request tokens do not have an expiration time, which could lead to unauthorized access if tokens are leaked. **Perspective 5:** The type definitions for secret approval requests do not include data classification, which is necessary for compliance with data protection regulations. **Perspective 6:** The approval request types do not include a mechanism for users to request deletion of their data, which is a requirement under GDPR.
Suggested Fix
Add data classification fields to the TSecretApprovalRequest type to ensure compliance with data protection regulations.
HIGHPotential exposure of sensitive information
frontend/src/hooks/api/secretApprovalRequest/types.ts:42
[AGENTS: Harbor - Sentinel]containers, input_validation
**Perspective 1:** The structure TSecretApprovalRequest contains fields that could expose sensitive information such as secret keys and values without proper access control. **Perspective 2:** The approval request data structure does not enforce validation on the fields, which could lead to inconsistent data being processed.
Suggested Fix
Implement validation checks for the fields in the approval request data structure.
HIGHMissing CSPRNG for security-critical random values
frontend/src/hooks/api/secretApprovalRequest/types.ts:80
[AGENTS: Deadbolt - Entropy - Fuse - Mirage]error_security, false_confidence, randomness, sessions
**Perspective 1:** The application does not utilize a cryptographically secure random number generator (CSPRNG) for generating security-critical values, which can lead to vulnerabilities. **Perspective 2:** The approval request does not appear to bind sessions to user identity, which can lead to session hijacking if the same approval request is processed by different users. **Perspective 3:** The approval request structure includes user emails and identifiers which could be exposed in error messages or logs, leading to information leakage. **Perspective 4:** The approval request status can be manipulated without sufficient checks, leading to unauthorized changes in approval workflows.
Suggested Fix
Implement role-based access control checks before allowing changes to approval request statuses.
HIGHLack of validation for sensitive fields
frontend/src/hooks/api/secretApprovalRequest/types.ts:88
[AGENTS: Harbor]containers
The fields secretKey and secretValue in TSecretApprovalSecChangeData are not validated for sensitive content, which could lead to exposure of secrets.
Suggested Fix
Add validation to ensure that sensitive fields do not contain hardcoded secrets or sensitive information.
HIGHInsecure handling of secret approval requests
frontend/src/hooks/api/secretApprovalRequest/types.ts:120
[AGENTS: Deadbolt - Harbor - Mirage]containers, false_confidence, sessions
**Perspective 1:** The approval request handling does not enforce strict access controls, potentially allowing unauthorized users to approve or reject requests. **Perspective 2:** The approval request does not specify a timeout for user sessions, which can lead to prolonged access if users forget to log out. **Perspective 3:** The approval request handling does not seem to enforce strict authorization checks, which may allow unauthorized users to access or modify approval requests.
Suggested Fix
Implement authorization checks to ensure that only authorized users can access or modify approval requests.
HIGHMissing request validation for secret approval requests
frontend/src/hooks/api/secretApprovalRequest/types.ts:139
[AGENTS: Gateway - Lockdown - Trace]configuration, edge_security, logging
**Perspective 1:** The request data structure for secret approval requests lacks comprehensive validation, which could lead to unauthorized access or data manipulation. **Perspective 2:** The approval request data structure allows for undefined values without validation, which could lead to errors or unexpected behavior when processing requests. **Perspective 3:** The approval request handling does not log significant actions such as approval or rejection of requests, which can hinder auditing and tracking. **Perspective 4:** The approval request process lacks correlation IDs, making it difficult to trace logs related to specific requests across different services.
Suggested Fix
Implement stricter validation for the request data structure to ensure all fields are properly validated.
HIGHMissing CSRF Protection
frontend/src/hooks/api/secretApprovalRequest/types.ts:140
[AGENTS: Deadbolt - Mirage - Supply]false_confidence, sessions, supply_chain
**Perspective 1:** The approval request handling does not include CSRF protection mechanisms, making it vulnerable to CSRF attacks. **Perspective 2:** There is no logging implemented for actions taken on approval requests, making it difficult to audit changes or detect unauthorized actions. **Perspective 3:** The error handling in the approval request mutation does not provide clear feedback to the user, which could lead to confusion.
Suggested Fix
Implement logging for all actions taken on approval requests to ensure accountability and traceability.
HIGHMissing sanitization for secret values
frontend/src/hooks/api/secretApprovalRequest/types.ts:149
[AGENTS: Sanitizer]sanitization
The secret values in the approval request types are not sanitized, which could lead to injection attacks if untrusted input is processed.
Suggested Fix
Implement input validation and sanitization for secret values before processing.
HIGHLack of error handling in secret rotation queries
frontend/src/hooks/api/secretRotation/queries.tsx:1
[AGENTS: Mirage]false_confidence
The queries for fetching secret rotations do not handle errors, which could lead to unhandled promise rejections and lack of feedback to the user.
Suggested Fix
Add error handling to the query functions to manage potential errors gracefully.
HIGHPotential for undefined workspace ID
frontend/src/hooks/api/secretRotation/queries.tsx:30
[AGENTS: Chaos]edge_cases
The function does not validate the workspace ID before making an API request, which could lead to errors if the ID is undefined.
Suggested Fix
Add validation to ensure the workspace ID is defined before proceeding with the API request.
HIGHLeaked sensitive data structure
frontend/src/hooks/api/secretRotations/types.ts:12
[AGENTS: Recon]info_disclosure
The structure of secret rotations, including sensitive fields, is exposed, which could lead to information disclosure if accessed improperly.
Suggested Fix
Avoid exposing sensitive data structures in public repositories. Consider using obfuscation or encryption.
HIGHPotential nonce reuse in secret rotations
frontend/src/hooks/api/secretRotationsV2/queries.tsx:1
[AGENTS: Compliance - Entropy]SOC 2, randomness
**Perspective 1:** The implementation may allow for nonce reuse in secret rotation operations, which could lead to vulnerabilities in encryption. **Perspective 2:** The queries related to secret rotations do not appear to have proper access control checks to ensure that only authorized users can access or modify secret rotations.
Suggested Fix
Add access control checks to ensure that only users with the appropriate permissions can access or modify secret rotations.
HIGHMissing authorization checks on secret rotation queries
frontend/src/hooks/api/secretRotationsV2/queries.tsx:10
[AGENTS: Gateway - Lockdown - Tripwire]configuration, edge_security, known_cve
**Perspective 1:** The queries for secret rotations do not include authorization checks, which may expose sensitive data to unauthorized users. **Perspective 2:** The API endpoint for listing secret rotation options does not validate the input parameters, which could lead to unauthorized access or data corruption. **Perspective 3:** The API endpoint for viewing generated credentials does not validate the input parameters, which could lead to unauthorized access or data corruption. **Perspective 4:** The API endpoint for creating secret rotations does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 5:** The API endpoint for updating secret rotations does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 6:** The API endpoint for revoking dynamic secret leases does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 7:** The API endpoint for renewing dynamic secret leases does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 8:** The API endpoint for creating dynamic secrets does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 9:** The API endpoint for deleting dynamic secrets does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 10:** The API endpoint for listing secret rotation providers does not validate the input data for required fields, which could lead to unauthorized access or data corruption. **Perspective 11:** The mutation function for creating a secret rotation does not sanitize inputs, which could lead to SQL injection vulnerabilities if user input is directly used in database queries. **Perspective 12:** The mutation function for updating a secret rotation does not sanitize inputs, which could lead to SQL injection vulnerabilities if user input is directly used in database queries. **Perspective 13:** The mutation function for deleting a secret rotation does not sanitize inputs, which could lead to SQL injection vulnerabilities if user input is directly used in database queries.
Suggested Fix
Implement input validation and sanitization for all user inputs before processing them in the mutation function.
HIGHUnsanitized user input in API request
frontend/src/hooks/api/secretRotationsV2/queries.tsx:12
[AGENTS: Egress - Recon - Supply - Syringe - Trace - Warden]GDPR, data_exfiltration, db_injection, info_disclosure, logging, privacy, supply_chain
**Perspective 1:** The query function uses unsanitized user input directly in the API request, which could lead to injection attacks. **Perspective 2:** The queries for secret rotations do not include any mechanism for tracking user consent, which is required under GDPR. **Perspective 3:** The queries for secret rotations may expose sensitive data if not properly secured. **Perspective 4:** The secret rotation responses may include PII that should be protected. **Perspective 5:** The query function does not log the sensitive data being sent in the request, which may expose sensitive information if the logs are accessed. **Perspective 6:** The API endpoint '/api/v2/secret-rotations/options' is exposed in the query function, which can lead to unauthorized access if not properly secured. **Perspective 7:** The query function retrieves sensitive data related to secret rotations without proper access controls, which could lead to unauthorized access to sensitive information. **Perspective 8:** The query function does not enforce signing of the secret rotation, which could lead to unauthorized changes.
Suggested Fix
Add logging to capture the sensitive data being sent in the request, ensuring it is properly sanitized or masked.
HIGHMissing tenant context in secret rotation queries
frontend/src/hooks/api/secretRotationsV2/queries.tsx:15
[AGENTS: Tenant]tenant_isolation
The query functions for secret rotations do not validate or include the tenant context, which can lead to unauthorized access to another tenant's data.
Suggested Fix
Ensure that tenantId is included in the query parameters to enforce tenant isolation.
HIGHPotential SQL Injection in API Request
frontend/src/hooks/api/secretRotationsV2/queries.tsx:20
[AGENTS: Chaos - Fuse]error_security, vulnerable_code
**Perspective 1:** The query function directly uses user input (rotationId, type) in the API request without validation or sanitization, which could lead to SQL injection vulnerabilities. **Perspective 2:** The useGetSecretValue hook does not handle errors that may occur during the API request, potentially leading to unhandled promise rejections.
Suggested Fix
Validate and sanitize rotationId and type before using them in the API request.
HIGHMissing rate limit on secret rotation creation
frontend/src/hooks/api/secretRotationsV2/queries.tsx:21
[AGENTS: Siege]dos
The endpoint for creating secret rotations does not implement any rate limiting, which could allow an attacker to overwhelm the server with requests.
Suggested Fix
Implement rate limiting on the useCreateSecretRotation mutation.
HIGHPotential information leak in secret rotation
frontend/src/hooks/api/secretRotationsV2/queries.tsx:60
[AGENTS: Fuse]error_security
The API request to view generated credentials may expose sensitive information if not handled properly.
Suggested Fix
Ensure that sensitive information is not logged or exposed in error messages.
HIGHError handling for secret rotation lease
frontend/src/hooks/api/secretRotationsV2/queries.tsx:75
[AGENTS: Fuse]error_security
The mutation for creating a dynamic secret lease does not handle errors, which could lead to unhandled promise rejections.
Suggested Fix
Add error handling to the mutation function to catch and handle errors appropriately.
HIGHMissing validation for user input in API request
frontend/src/hooks/api/secretRotationsV2/queries.tsx:83
[AGENTS: Harbor - Mirage - Sanitizer - Sentinel - Weights]containers, false_confidence, input_validation, model_supply_chain, sanitization
**Perspective 1:** The query function does not validate the input DTO for viewing secret rotation generated credentials, which could lead to invalid data being sent to the API. **Perspective 2:** The API request to view secret rotation generated credentials does not appear to sanitize or validate the input data before sending it to the server, which could lead to injection attacks. **Perspective 3:** The query function for viewing generated credentials does not handle errors properly, which could lead to unhandled promise rejections. **Perspective 4:** The query function in useSecretRotationV2Options does not validate the input parameters before sending it to the API, which could lead to insecure API requests. **Perspective 5:** The queries for secret rotations do not handle errors properly, which could lead to unhandled promise rejections and poor user experience.
Suggested Fix
Implement input validation and sanitization for the fields in TViewSecretRotationV2GeneratedCredentialsDTO before making the API request.
HIGHError handling for revoking dynamic secret lease
frontend/src/hooks/api/secretRotationsV2/queries.tsx:90
[AGENTS: Fuse]error_security
The mutation for revoking a dynamic secret lease does not handle errors, which could lead to unhandled promise rejections.
Suggested Fix
Add error handling to the mutation function to catch and handle errors appropriately.
HIGHError handling for renewing dynamic secret lease
frontend/src/hooks/api/secretRotationsV2/queries.tsx:105
[AGENTS: Fuse]error_security
The mutation for renewing a dynamic secret lease does not handle errors, which could lead to unhandled promise rejections.
Suggested Fix
Add error handling to the mutation function to catch and handle errors appropriately.
HIGHMissing artifact signing enforcement
frontend/src/hooks/api/secretRotationsV2/types.ts:12
[AGENTS: Supply]supply_chain
The secret rotation does not enforce signing, which could lead to unauthorized access.
Suggested Fix
Implement artifact signing and verification for the secret rotation.
HIGHLack of access control for AWS IAM user secrets
frontend/src/hooks/api/secretRotationsV2/types/aws-iam-user-secret-rotation.ts:1
[AGENTS: Compliance]regulatory
The AWS IAM user secret rotation type does not enforce access controls to ensure that only authorized users can access sensitive credentials.
Suggested Fix
Implement access control mechanisms to restrict access to AWS IAM user secrets.
HIGHMissing tenant scoping in secret rotation
frontend/src/hooks/api/secretRotationsV2/types/aws-iam-user-secret-rotation.ts:20
[AGENTS: Mirage - Tenant]false_confidence, tenant_isolation
**Perspective 1:** The AWS IAM user secret rotation type does not enforce tenant isolation, potentially allowing one tenant to access another tenant's secrets. **Perspective 2:** The function for AWS IAM user secret rotation does not validate or check permissions before returning generated credentials, potentially allowing unauthorized access.
Suggested Fix
Ensure that all API calls related to secret rotation include tenant_id in their parameters.
HIGHHardcoded AWS IAM User Secret
frontend/src/hooks/api/secretRotationsV2/types/aws-iam-user-secret-rotation.ts:24
[AGENTS: Harbor]secrets
The AWS IAM user secret includes sensitive information such as accessKeyId and secretAccessKey which should not be hardcoded.
Suggested Fix
Use environment variables or a secure vault to manage sensitive credentials.
HIGHSensitive data exposure
frontend/src/hooks/api/secretRotationsV2/types/aws-iam-user-secret-rotation.ts:39
[AGENTS: Egress - Recon - Warden]data_exfiltration, info_disclosure, privacy
**Perspective 1:** The AWS IAM user secret rotation type exposes access key ID and secret access key without encryption. **Perspective 2:** The AWS IAM User Secret Rotation type exposes sensitive information such as accessKeyId and secretAccessKey in the secretsMapping object. **Perspective 3:** The type definition for TAwsIamUserSecretRotation includes accessKeyId and secretAccessKey, which are sensitive credentials. If this type is logged or exposed in any way, it could lead to data exfiltration.
Suggested Fix
Ensure that sensitive credentials are not exposed in the response or UI. Use appropriate access controls.
HIGHInadequate protection for Azure client secrets
frontend/src/hooks/api/secretRotationsV2/types/azure-client-secret-rotation.ts:1
[AGENTS: Compliance - Passkey]credential storage, regulatory
**Perspective 1:** The Azure client secret rotation type does not specify how client secrets are protected, potentially exposing sensitive information. **Perspective 2:** The Azure client secret rotation structure includes a client secret field without any indication of encryption or secure storage practices.
Suggested Fix
Ensure that Azure client secrets are stored securely and access is controlled.
HIGHPotential exposure of sensitive information
frontend/src/hooks/api/secretRotationsV2/types/azure-client-secret-rotation.ts:20
[AGENTS: Mirage - Supply]false_confidence, supply_chain
**Perspective 1:** The secrets mapping for the Azure Client Secret rotation includes a client secret field which may not be adequately protected during logging or error handling. **Perspective 2:** The function for Azure client secret rotation does not validate or check permissions before returning generated credentials, potentially allowing unauthorized access.
Suggested Fix
Ensure that sensitive information such as client secrets is not logged or exposed in error messages.
HIGHHardcoded Azure Client Secret
frontend/src/hooks/api/secretRotationsV2/types/azure-client-secret-rotation.ts:24
[AGENTS: Harbor]secrets
The Azure client secret includes sensitive information such as clientId and clientSecret which should not be hardcoded.
Suggested Fix
Use environment variables or a secure vault to manage sensitive credentials.
HIGHSensitive Information Exposure
frontend/src/hooks/api/secretRotationsV2/types/azure-client-secret-rotation.ts:30
[AGENTS: Fuse]error_security
The client secret field in the secrets mapping is exposed in the response, which can lead to sensitive information leakage.
Suggested Fix
Ensure sensitive information is not returned in the API response or is adequately masked.
HIGHSensitive data exposure in Azure client secret rotation
frontend/src/hooks/api/secretRotationsV2/types/azure-client-secret-rotation.ts:35
[AGENTS: Gateway]edge_security
The Azure client secret rotation exposes sensitive information without proper access controls, which could lead to unauthorized access.
Suggested Fix
Implement proper access controls and encryption for sensitive data in Azure client secrets.
HIGHSensitive data exposure
frontend/src/hooks/api/secretRotationsV2/types/azure-client-secret-rotation.ts:39
[AGENTS: Egress - Recon - Warden]data_exfiltration, info_disclosure, privacy
**Perspective 1:** The Azure client secret rotation type exposes client ID and client secret without encryption. **Perspective 2:** The Azure Client Secret Rotation type exposes sensitive information such as clientId and clientSecret in the secretsMapping object. **Perspective 3:** The type definition for TAzureClientSecretRotation includes clientId and clientSecret, which are sensitive credentials. If this type is logged or exposed in any way, it could lead to data exfiltration.
Suggested Fix
Ensure that sensitive credentials are not exposed in the response or UI. Use appropriate access controls.
HIGHWeak protection for Databricks service principal secrets
frontend/src/hooks/api/secretRotationsV2/types/databricks-service-principal-secret-rotation.ts:1
[AGENTS: Compliance - Passkey]credential storage, regulatory
**Perspective 1:** The Databricks service principal secret rotation type does not enforce adequate protection for sensitive secrets. **Perspective 2:** The Databricks service principal secret rotation structure includes a client secret field without any indication of encryption or secure storage practices.
Suggested Fix
Ensure that Databricks service principal secrets are stored securely and access is restricted.
HIGHPotential exposure of sensitive information
frontend/src/hooks/api/secretRotationsV2/types/databricks-service-principal-secret-rotation.ts:20
[AGENTS: Mirage - Supply]false_confidence, supply_chain
**Perspective 1:** The secrets mapping for the Databricks Service Principal Secret rotation includes a client secret field which may not be adequately protected during logging or error handling. **Perspective 2:** The function for Databricks service principal secret rotation does not validate or check permissions before returning generated credentials, potentially allowing unauthorized access.
Suggested Fix
Ensure that sensitive information such as client secrets is not logged or exposed in error messages.
HIGHSensitive Information Exposure
frontend/src/hooks/api/secretRotationsV2/types/databricks-service-principal-secret-rotation.ts:30
[AGENTS: Fuse]error_security
The client secret field in the secrets mapping is exposed in the response, which can lead to sensitive information leakage.
Suggested Fix
Ensure sensitive information is not returned in the API response or is adequately masked.
HIGHSensitive data exposure
frontend/src/hooks/api/secretRotationsV2/types/databricks-service-principal-secret-rotation.ts:39
[AGENTS: Blacklist - Warden]output_encoding, privacy
**Perspective 1:** The Databricks service principal secret rotation type exposes client ID and client secret without encryption. **Perspective 2:** The Databricks Service Principal Secret Rotation parameters do not validate or sanitize user inputs for clientId and clientSecret, which can lead to XSS vulnerabilities.
Suggested Fix
Ensure clientId and clientSecret are sanitized or escaped before rendering in the UI.
HIGHPotential Databricks Command Injection
frontend/src/hooks/api/secretRotationsV2/types/databricks-service-principal-secret-rotation.ts:40
[AGENTS: Egress - Recon - Syringe]data_exfiltration, db_injection, info_disclosure
**Perspective 1:** The parameters for Databricks service principal secret rotation do not appear to be sanitized or validated against injection attacks, which could allow for command injection vulnerabilities. **Perspective 2:** The Databricks Service Principal Secret Rotation type exposes sensitive information such as clientId and clientSecret in the secretsMapping object. **Perspective 3:** The type definition for TDatabricksServicePrincipalSecretRotation includes clientId and clientSecret, which are sensitive credentials. If this type is logged or exposed in any way, it could lead to data exfiltration.
Suggested Fix
Implement input validation and sanitization for the 'servicePrincipalId' and 'clientId' fields to prevent command injection.
HIGHInsufficient protection for DBT service tokens
frontend/src/hooks/api/secretRotationsV2/types/dbt-service-token-rotation.ts:1
[AGENTS: Compliance]regulatory
The DBT service token rotation type lacks adequate protection for sensitive token information.
Suggested Fix
Ensure that DBT service tokens are stored securely and access is controlled.
HIGHPotential exposure of sensitive information
frontend/src/hooks/api/secretRotationsV2/types/dbt-service-token-rotation.ts:20
[AGENTS: Mirage - Supply]false_confidence, supply_chain
**Perspective 1:** The secrets mapping for the DBT Service Token rotation includes a service token field which may not be adequately protected during logging or error handling. **Perspective 2:** The function for DBT service token rotation does not validate or check permissions before returning generated credentials, potentially allowing unauthorized access.
Suggested Fix
Ensure that sensitive information such as service tokens is not logged or exposed in error messages.
HIGHHardcoded DBT Service Token
frontend/src/hooks/api/secretRotationsV2/types/dbt-service-token-rotation.ts:24
[AGENTS: Harbor]secrets
The DBT service token includes sensitive information which should not be hardcoded.
Suggested Fix
Use environment variables or a secure vault to manage sensitive credentials.
HIGHSensitive data exposure
frontend/src/hooks/api/secretRotationsV2/types/dbt-service-token-rotation.ts:40
[AGENTS: Egress - Recon - Warden]data_exfiltration, info_disclosure, privacy
**Perspective 1:** The DBT service token rotation type exposes service token without encryption. **Perspective 2:** The DBT Service Token Rotation type exposes sensitive information such as serviceToken in the secretsMapping object. **Perspective 3:** The type definition for TDbtServiceTokenRotation includes serviceToken, which is a sensitive credential. If this type is logged or exposed in any way, it could lead to data exfiltration.
Suggested Fix
Ensure that sensitive credentials are not exposed in the response or UI. Use appropriate access controls.

Summary

Consensus from 2448 reviewer(s): Blacklist, Vault, Specter, Deadbolt, Pedant, Razor, Compliance, Sanitizer, Syringe, Chaos, Gatekeeper, Cipher, Sentinel, Harbor, Trace, Tripwire, Passkey, Supply, Recon, Entropy, Warden, Lockdown, Phantom, Gateway, Infiltrator, Provenance, Prompt, Egress, Siege, Wallet, Vector, Mirage, Fuse, Weights, Exploit, Tenant, Pedant, Razor, Specter, Chaos, Vault, Syringe, Deadbolt, Sanitizer, Sentinel, Gatekeeper, Cipher, Passkey, Compliance, Entropy, Phantom, Warden, Siege, Lockdown, Blacklist, Harbor, Gateway, Tripwire, Fuse, Infiltrator, Trace, Prompt, Recon, Supply, Provenance, Vector, Wallet, Egress, Mirage, Exploit, Weights, Tenant, Razor, Pedant, Specter, Vault, Gatekeeper, Chaos, Sentinel, Cipher, Deadbolt, Blacklist, Entropy, Phantom, Warden, Sanitizer, Passkey, Syringe, Tripwire, Siege, Lockdown, Infiltrator, Compliance, Harbor, Vector, Provenance, Prompt, Wallet, Trace, Gateway, Exploit, Mirage, Weights, Tenant, Supply, Recon, Fuse, Egress, Razor, Pedant, Specter, Vault, Gatekeeper, Syringe, Blacklist, Cipher, Sentinel, Chaos, Warden, Phantom, Deadbolt, Siege, Passkey, Compliance, Lockdown, Sanitizer, Harbor, Infiltrator, Entropy, Tripwire, Vector, Provenance, Prompt, Wallet, Trace, Gateway, Exploit, Weights, Recon, Fuse, Supply, Egress, Tenant, Mirage, Razor, Pedant, Chaos, Sentinel, Specter, Blacklist, Syringe, Sanitizer, Vault, Gatekeeper, Deadbolt, Passkey, Cipher, Warden, Compliance, Entropy, Phantom, Siege, Lockdown, Gateway, Harbor, Tripwire, Trace, Supply, Infiltrator, Fuse, Recon, Vector, Provenance, Prompt, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Razor, Pedant, Specter, Chaos, Blacklist, Syringe, Vault, Gatekeeper, Deadbolt, Cipher, Sentinel, Warden, Phantom, Sanitizer, Passkey, Compliance, Entropy, Harbor, Siege, Infiltrator, Gateway, Tripwire, Vector, Provenance, Prompt, Wallet, Lockdown, Mirage, Exploit, Supply, Fuse, Trace, Weights, Recon, Egress, Tenant, Razor, Pedant, Specter, Chaos, Sentinel, Vault, Gatekeeper, Deadbolt, Cipher, Syringe, Warden, Sanitizer, Phantom, Blacklist, Passkey, Entropy, Siege, Lockdown, Gateway, Infiltrator, Compliance, Supply, Vector, Provenance, Prompt, Wallet, Harbor, Tripwire, Exploit, Recon, Trace, Weights, Fuse, Tenant, Mirage, Egress, Razor, Pedant, Chaos, Specter, Blacklist, Sentinel, Vault, Gatekeeper, Cipher, Syringe, Deadbolt, Sanitizer, Phantom, Passkey, Warden, Entropy, Compliance, Siege, Lockdown, Infiltrator, Gateway, Harbor, Vector, Provenance, Prompt, Wallet, Tripwire, Recon, Exploit, Supply, Mirage, Weights, Tenant, Trace, Fuse, Egress, Razor, Pedant, Specter, Sentinel, Vault, Gatekeeper, Chaos, Cipher, Blacklist, Deadbolt, Syringe, Phantom, Passkey, Warden, Sanitizer, Compliance, Entropy, Siege, Harbor, Infiltrator, Lockdown, Gateway, Vector, Provenance, Prompt, Wallet, Trace, Tripwire, Exploit, Recon, Fuse, Mirage, Egress, Weights, Supply, Tenant, Razor, Pedant, Specter, Chaos, Sentinel, Vault, Gatekeeper, Blacklist, Cipher, Sanitizer, Syringe, Phantom, Deadbolt, Passkey, Gateway, Entropy, Compliance, Warden, Siege, Infiltrator, Harbor, Lockdown, Vector, Provenance, Prompt, Wallet, Tripwire, Fuse, Exploit, Trace, Supply, Recon, Mirage, Weights, Egress, Tenant, Razor, Pedant, Specter, Chaos, Blacklist, Vault, Gatekeeper, Sentinel, Cipher, Syringe, Deadbolt, Phantom, Sanitizer, Passkey, Warden, Compliance, Entropy, Tripwire, Siege, Infiltrator, Harbor, Lockdown, Vector, Provenance, Prompt, Wallet, Gateway, Fuse, Exploit, Trace, Supply, Recon, Tenant, Weights, Egress, Mirage, Razor, Pedant, Chaos, Sentinel, Specter, Syringe, Sanitizer, Vault, Gatekeeper, Passkey, Cipher, Warden, Compliance, Deadbolt, Phantom, Siege, Lockdown, Gateway, Blacklist, Entropy, Trace, Infiltrator, Fuse, Vector, Provenance, Prompt, Wallet, Mirage, Tripwire, Exploit, Tenant, Recon, Harbor, Weights, Supply, Egress, Razor, Pedant, Chaos, Sentinel, Specter, Blacklist, Syringe, Sanitizer, Vault, Gatekeeper, Passkey, Cipher, Warden, Compliance, Entropy, Phantom, Siege, Lockdown, Gateway, Harbor, Tripwire, Trace, Supply, Infiltrator, Fuse, Recon, Vector, Provenance, Prompt, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Deadbolt, Blacklist, Infiltrator, Chaos, Prompt, Specter, Fuse, Gatekeeper, Sentinel, Vector, Passkey, Cipher, Recon, Harbor, Phantom, Syringe, Entropy, Supply, Lockdown, Deadbolt, Trace, Compliance, Vault, Provenance, Siege, Gateway, Warden, Sanitizer, Pedant, Tripwire, Razor, Mirage, Wallet, Egress, Exploit, Tenant, Weights, Warden, Sentinel, Vector, Phantom, Tripwire, Compliance, Gateway, Recon, Entropy, Pedant, Razor, Infiltrator, Lockdown, Trace, Supply, Harbor, Syringe, Deadbolt, Gatekeeper, Prompt, Specter, Vault, Sanitizer, Cipher, Siege, Provenance, Fuse, Chaos, Passkey, Blacklist, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Harbor, Fuse, Deadbolt, Phantom, Lockdown, Syringe, Tripwire, Trace, Razor, Gatekeeper, Vector, Entropy, Sentinel, Pedant, Chaos, Gateway, Provenance, Vault, Recon, Compliance, Passkey, Siege, Blacklist, Specter, Cipher, Warden, Sanitizer, Infiltrator, Prompt, Supply, Tenant, Wallet, Mirage, Weights, Exploit, Egress, Deadbolt, Supply, Harbor, Provenance, Compliance, Tripwire, Gatekeeper, Syringe, Vault, Sanitizer, Blacklist, Razor, Vector, Cipher, Passkey, Sentinel, Chaos, Siege, Trace, Entropy, Pedant, Specter, Phantom, Infiltrator, Fuse, Recon, Warden, Prompt, Gateway, Lockdown, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Vault, Siege, Prompt, Chaos, Entropy, Passkey, Pedant, Phantom, Lockdown, Sanitizer, Provenance, Sentinel, Gatekeeper, Vector, Supply, Blacklist, Recon, Razor, Gateway, Harbor, Infiltrator, Syringe, Deadbolt, Tripwire, Cipher, Fuse, Warden, Specter, Trace, Compliance, Wallet, Exploit, Egress, Weights, Tenant, Mirage, Recon, Deadbolt, Fuse, Entropy, Phantom, Specter, Vault, Harbor, Lockdown, Passkey, Syringe, Sentinel, Supply, Tripwire, Blacklist, Pedant, Trace, Warden, Sanitizer, Gatekeeper, Razor, Compliance, Gateway, Siege, Prompt, Vector, Cipher, Chaos, Infiltrator, Provenance, Egress, Mirage, Weights, Exploit, Tenant, Wallet, Fuse, Vault, Syringe, Deadbolt, Specter, Tripwire, Cipher, Provenance, Trace, Warden, Razor, Pedant, Entropy, Prompt, Gateway, Harbor, Chaos, Vector, Sentinel, Recon, Lockdown, Supply, Compliance, Siege, Blacklist, Infiltrator, Passkey, Gatekeeper, Phantom, Sanitizer, Tenant, Wallet, Mirage, Weights, Exploit, Egress, Specter, Recon, Deadbolt, Blacklist, Sentinel, Gatekeeper, Supply, Compliance, Pedant, Vault, Infiltrator, Harbor, Razor, Syringe, Lockdown, Siege, Fuse, Sanitizer, Cipher, Tripwire, Phantom, Chaos, Provenance, Prompt, Passkey, Entropy, Warden, Vector, Trace, Gateway, Mirage, Wallet, Exploit, Tenant, Egress, Weights, Prompt, Sentinel, Siege, Syringe, Deadbolt, Tripwire, Lockdown, Supply, Passkey, Pedant, Cipher, Provenance, Gateway, Vector, Blacklist, Compliance, Infiltrator, Warden, Phantom, Chaos, Sanitizer, Harbor, Specter, Entropy, Fuse, Razor, Gatekeeper, Recon, Trace, Vault, Weights, Wallet, Mirage, Tenant, Egress, Exploit, Fuse, Deadbolt, Harbor, Phantom, Warden, Gatekeeper, Entropy, Supply, Compliance, Trace, Infiltrator, Syringe, Vault, Specter, Blacklist, Cipher, Pedant, Passkey, Prompt, Chaos, Vector, Siege, Sentinel, Provenance, Lockdown, Razor, Sanitizer, Recon, Tripwire, Gateway, Egress, Mirage, Weights, Exploit, Tenant, Wallet, Gatekeeper, Entropy, Syringe, Pedant, Compliance, Harbor, Supply, Vault, Provenance, Infiltrator, Gateway, Razor, Passkey, Recon, Fuse, Prompt, Deadbolt, Cipher, Lockdown, Vector, Sanitizer, Siege, Sentinel, Trace, Warden, Specter, Blacklist, Chaos, Phantom, Tripwire, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Trace, Chaos, Supply, Phantom, Gatekeeper, Blacklist, Vault, Infiltrator, Deadbolt, Tripwire, Passkey, Pedant, Gateway, Sanitizer, Lockdown, Syringe, Sentinel, Siege, Compliance, Prompt, Cipher, Razor, Harbor, Warden, Vector, Entropy, Provenance, Recon, Fuse, Specter, Weights, Egress, Mirage, Tenant, Wallet, Exploit, Recon, Sentinel, Vector, Sanitizer, Compliance, Trace, Deadbolt, Cipher, Pedant, Entropy, Syringe, Razor, Supply, Lockdown, Prompt, Fuse, Chaos, Vault, Specter, Blacklist, Tripwire, Siege, Gateway, Provenance, Phantom, Passkey, Infiltrator, Gatekeeper, Warden, Harbor, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Warden, Blacklist, Vault, Deadbolt, Lockdown, Harbor, Sentinel, Supply, Syringe, Gatekeeper, Passkey, Entropy, Tripwire, Prompt, Vector, Razor, Provenance, Specter, Recon, Siege, Cipher, Compliance, Fuse, Gateway, Phantom, Pedant, Infiltrator, Chaos, Sanitizer, Trace, Tenant, Wallet, Mirage, Weights, Exploit, Egress, Pedant, Provenance, Warden, Infiltrator, Trace, Supply, Gateway, Deadbolt, Gatekeeper, Vector, Vault, Tripwire, Prompt, Passkey, Specter, Cipher, Recon, Blacklist, Fuse, Siege, Syringe, Harbor, Lockdown, Phantom, Sentinel, Entropy, Razor, Chaos, Sanitizer, Compliance, Weights, Wallet, Mirage, Tenant, Egress, Exploit, Harbor, Gatekeeper, Supply, Vault, Trace, Blacklist, Cipher, Compliance, Chaos, Warden, Gateway, Phantom, Specter, Prompt, Vector, Siege, Provenance, Passkey, Recon, Deadbolt, Infiltrator, Tripwire, Fuse, Entropy, Sanitizer, Sentinel, Razor, Pedant, Syringe, Lockdown, Wallet, Exploit, Egress, Weights, Tenant, Mirage, Lockdown, Infiltrator, Siege, Supply, Blacklist, Phantom, Chaos, Sentinel, Entropy, Tripwire, Passkey, Razor, Compliance, Pedant, Sanitizer, Gatekeeper, Provenance, Trace, Specter, Fuse, Deadbolt, Vector, Vault, Recon, Harbor, Warden, Gateway, Cipher, Prompt, Syringe, Wallet, Exploit, Weights, Egress, Mirage, Tenant, Razor, Sanitizer, Sentinel, Chaos, Pedant, Blacklist, Deadbolt, Specter, Gatekeeper, Syringe, Passkey, Cipher, Vault, Warden, Entropy, Compliance, Siege, Lockdown, Gateway, Phantom, Trace, Tripwire, Harbor, Supply, Infiltrator, Fuse, Recon, Vector, Provenance, Prompt, Mirage, Wallet, Weights, Exploit, Egress, Tenant, Chaos, Pedant, Sentinel, Razor, Specter, Blacklist, Syringe, Vault, Deadbolt, Sanitizer, Gatekeeper, Cipher, Warden, Siege, Entropy, Phantom, Compliance, Passkey, Lockdown, Gateway, Trace, Infiltrator, Tripwire, Fuse, Supply, Harbor, Prompt, Provenance, Recon, Vector, Wallet, Mirage, Weights, Exploit, Egress, Tenant, Razor, Syringe, Pedant, Chaos, Sentinel, Specter, Blacklist, Sanitizer, Gatekeeper, Deadbolt, Passkey, Cipher, Warden, Vault, Compliance, Siege, Gateway, Tripwire, Phantom, Supply, Lockdown, Trace, Harbor, Entropy, Recon, Fuse, Vector, Prompt, Infiltrator, Weights, Exploit, Mirage, Tenant, Egress, Provenance, Wallet, Razor, Sentinel, Chaos, Pedant, Vault, Specter, Blacklist, Syringe, Sanitizer, Gatekeeper, Warden, Deadbolt, Cipher, Entropy, Lockdown, Phantom, Gateway, Siege, Harbor, Trace, Supply, Passkey, Tripwire, Compliance, Recon, Provenance, Prompt, Infiltrator, Vector, Fuse, Weights, Exploit, Tenant, Wallet, Egress, Mirage, Razor, Pedant, Blacklist, Sentinel, Specter, Chaos, Syringe, Sanitizer, Vault, Cipher, Deadbolt, Passkey, Entropy, Phantom, Siege, Gatekeeper, Gateway, Compliance, Harbor, Tripwire, Warden, Fuse, Recon, Supply, Infiltrator, Lockdown, Provenance, Trace, Prompt, Wallet, Mirage, Weights, Vector, Exploit, Egress, Tenant, Gateway, Razor, Harbor, Passkey, Compliance, Entropy, Vault, Tripwire, Gatekeeper, Chaos, Recon, Fuse, Supply, Sanitizer, Lockdown, Blacklist, Pedant, Cipher, Syringe, Vector, Provenance, Sentinel, Infiltrator, Prompt, Specter, Warden, Deadbolt, Siege, Phantom, Trace, Mirage, Tenant, Wallet, Weights, Exploit, Egress, Phantom, Syringe, Infiltrator, Blacklist, Recon, Vector, Harbor, Supply, Compliance, Sanitizer, Specter, Tripwire, Cipher, Provenance, Passkey, Deadbolt, Gateway, Warden, Vault, Prompt, Entropy, Fuse, Sentinel, Pedant, Trace, Razor, Lockdown, Siege, Chaos, Gatekeeper, Tenant, Wallet, Mirage, Weights, Exploit, Egress, Vector, Fuse, Blacklist, Sentinel, Harbor, Prompt, Gateway, Siege, Warden, Passkey, Gatekeeper, Tripwire, Trace, Pedant, Entropy, Syringe, Infiltrator, Phantom, Razor, Vault, Specter, Sanitizer, Cipher, Chaos, Supply, Lockdown, Compliance, Provenance, Deadbolt, Recon, Egress, Mirage, Weights, Exploit, Tenant, Wallet, Syringe, Specter, Razor, Recon, Supply, Passkey, Gatekeeper, Compliance, Provenance, Entropy, Lockdown, Vault, Infiltrator, Prompt, Fuse, Siege, Sanitizer, Cipher, Sentinel, Deadbolt, Tripwire, Harbor, Pedant, Warden, Chaos, Trace, Phantom, Gateway, Blacklist, Vector, Weights, Tenant, Wallet, Mirage, Exploit, Egress, Harbor, Supply, Razor, Siege, Phantom, Prompt, Tripwire, Deadbolt, Sanitizer, Specter, Trace, Sentinel, Passkey, Vector, Provenance, Infiltrator, Gatekeeper, Chaos, Recon, Syringe, Entropy, Blacklist, Lockdown, Vault, Warden, Fuse, Pedant, Gateway, Cipher, Compliance, Wallet, Tenant, Weights, Exploit, Mirage, Egress, Warden, Compliance, Blacklist, Supply, Vault, Prompt, Fuse, Phantom, Gatekeeper, Tripwire, Cipher, Harbor, Deadbolt, Syringe, Pedant, Provenance, Chaos, Gateway, Trace, Specter, Lockdown, Sanitizer, Siege, Vector, Sentinel, Infiltrator, Entropy, Recon, Passkey, Razor, Weights, Wallet, Mirage, Tenant, Egress, Exploit, Vault, Razor, Provenance, Specter, Fuse, Entropy, Supply, Tripwire, Recon, Lockdown, Trace, Gateway, Passkey, Chaos, Pedant, Prompt, Siege, Cipher, Syringe, Harbor, Sanitizer, Compliance, Infiltrator, Deadbolt, Gatekeeper, Vector, Phantom, Warden, Blacklist, Sentinel, Wallet, Exploit, Egress, Weights, Tenant, Mirage, Vector, Compliance, Chaos, Infiltrator, Pedant, Blacklist, Trace, Deadbolt, Prompt, Sentinel, Tripwire, Razor, Gatekeeper, Recon, Gateway, Entropy, Specter, Harbor, Sanitizer, Fuse, Supply, Vault, Siege, Passkey, Phantom, Syringe, Lockdown, Provenance, Warden, Cipher, Wallet, Weights, Mirage, Tenant, Egress, Exploit, Chaos, Tripwire, Passkey, Harbor, Cipher, Fuse, Razor, Warden, Provenance, Deadbolt, Pedant, Vault, Infiltrator, Sanitizer, Blacklist, Syringe, Phantom, Prompt, Siege, Lockdown, Sentinel, Specter, Gatekeeper, Recon, Vector, Gateway, Entropy, Supply, Trace, Compliance, Mirage, Wallet, Egress, Exploit, Tenant, Weights, Fuse, Trace, Deadbolt, Vector, Infiltrator, Recon, Pedant, Cipher, Blacklist, Provenance, Siege, Tripwire, Phantom, Harbor, Razor, Vault, Warden, Prompt, Gateway, Specter, Sanitizer, Sentinel, Compliance, Passkey, Syringe, Gatekeeper, Lockdown, Chaos, Supply, Entropy, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Compliance, Prompt, Blacklist, Supply, Siege, Fuse, Tripwire, Phantom, Vector, Sanitizer, Passkey, Specter, Pedant, Gatekeeper, Chaos, Recon, Syringe, Deadbolt, Infiltrator, Sentinel, Gateway, Trace, Cipher, Warden, Lockdown, Razor, Entropy, Harbor, Provenance, Vault, Wallet, Egress, Weights, Exploit, Tenant, Mirage, Warden, Infiltrator, Compliance, Fuse, Deadbolt, Prompt, Syringe, Phantom, Blacklist, Sentinel, Lockdown, Entropy, Supply, Specter, Pedant, Gatekeeper, Sanitizer, Siege, Provenance, Gateway, Chaos, Tripwire, Vector, Passkey, Harbor, Recon, Razor, Vault, Trace, Cipher, Tenant, Wallet, Mirage, Weights, Exploit, Egress, Provenance, Entropy, Pedant, Harbor, Warden, Blacklist, Razor, Prompt, Gateway, Infiltrator, Sentinel, Chaos, Vector, Phantom, Syringe, Siege, Fuse, Lockdown, Vault, Compliance, Deadbolt, Trace, Tripwire, Supply, Specter, Recon, Gatekeeper, Cipher, Sanitizer, Passkey, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Chaos, Sentinel, Prompt, Cipher, Phantom, Infiltrator, Fuse, Lockdown, Vector, Gatekeeper, Syringe, Entropy, Compliance, Trace, Pedant, Razor, Warden, Gateway, Specter, Siege, Recon, Sanitizer, Supply, Deadbolt, Tripwire, Harbor, Vault, Provenance, Passkey, Blacklist, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Prompt, Deadbolt, Gateway, Syringe, Vault, Supply, Infiltrator, Chaos, Tripwire, Sanitizer, Siege, Sentinel, Fuse, Passkey, Blacklist, Razor, Harbor, Lockdown, Pedant, Specter, Recon, Provenance, Vector, Trace, Gatekeeper, Entropy, Compliance, Warden, Cipher, Phantom, Egress, Mirage, Weights, Exploit, Tenant, Wallet, Chaos, Trace, Pedant, Gatekeeper, Fuse, Gateway, Supply, Phantom, Infiltrator, Warden, Syringe, Prompt, Siege, Vault, Entropy, Blacklist, Specter, Recon, Tripwire, Razor, Cipher, Passkey, Lockdown, Sanitizer, Sentinel, Vector, Harbor, Compliance, Provenance, Deadbolt, Exploit, Wallet, Mirage, Weights, Egress, Tenant, Supply, Fuse, Recon, Sanitizer, Blacklist, Phantom, Vector, Harbor, Entropy, Passkey, Razor, Specter, Provenance, Cipher, Vault, Syringe, Trace, Chaos, Gatekeeper, Prompt, Gateway, Lockdown, Deadbolt, Warden, Compliance, Pedant, Siege, Tripwire, Infiltrator, Sentinel, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Compliance, Chaos, Trace, Lockdown, Cipher, Harbor, Syringe, Razor, Warden, Passkey, Supply, Gatekeeper, Vault, Prompt, Deadbolt, Entropy, Sentinel, Recon, Siege, Phantom, Sanitizer, Pedant, Specter, Blacklist, Fuse, Infiltrator, Tripwire, Vector, Gateway, Provenance, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Razor, Vector, Trace, Provenance, Specter, Warden, Blacklist, Gatekeeper, Fuse, Vault, Passkey, Entropy, Lockdown, Siege, Syringe, Prompt, Supply, Tripwire, Deadbolt, Gateway, Cipher, Sanitizer, Pedant, Sentinel, Harbor, Chaos, Compliance, Infiltrator, Phantom, Recon, Mirage, Wallet, Tenant, Exploit, Egress, Weights, Chaos, Harbor, Passkey, Prompt, Gatekeeper, Trace, Syringe, Warden, Fuse, Entropy, Cipher, Recon, Specter, Infiltrator, Siege, Supply, Phantom, Blacklist, Vector, Provenance, Pedant, Sentinel, Tripwire, Gateway, Compliance, Vault, Razor, Deadbolt, Lockdown, Sanitizer, Egress, Mirage, Weights, Exploit, Tenant, Wallet, Sentinel, Cipher, Infiltrator, Blacklist, Recon, Supply, Siege, Warden, Gatekeeper, Prompt, Passkey, Harbor, Phantom, Vector, Pedant, Sanitizer, Lockdown, Provenance, Tripwire, Entropy, Razor, Deadbolt, Vault, Chaos, Gateway, Trace, Fuse, Specter, Compliance, Syringe, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Supply, Syringe, Specter, Deadbolt, Gatekeeper, Cipher, Provenance, Entropy, Lockdown, Tripwire, Blacklist, Vector, Siege, Pedant, Recon, Phantom, Sentinel, Trace, Infiltrator, Sanitizer, Harbor, Passkey, Gateway, Warden, Prompt, Fuse, Chaos, Compliance, Razor, Vault, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Chaos, Recon, Provenance, Pedant, Gatekeeper, Warden, Entropy, Siege, Supply, Vault, Fuse, Compliance, Harbor, Infiltrator, Prompt, Passkey, Tripwire, Phantom, Blacklist, Gateway, Lockdown, Sanitizer, Deadbolt, Razor, Sentinel, Trace, Vector, Specter, Cipher, Syringe, Exploit, Wallet, Mirage, Weights, Tenant, Egress, Passkey, Harbor, Vector, Sanitizer, Cipher, Syringe, Razor, Infiltrator, Blacklist, Tripwire, Deadbolt, Sentinel, Entropy, Warden, Siege, Specter, Lockdown, Vault, Provenance, Recon, Prompt, Pedant, Phantom, Gateway, Gatekeeper, Trace, Compliance, Fuse, Chaos, Supply, Mirage, Wallet, Exploit, Tenant, Egress, Weights, Infiltrator, Deadbolt, Recon, Supply, Gateway, Vault, Blacklist, Razor, Trace, Fuse, Harbor, Pedant, Provenance, Entropy, Sentinel, Tripwire, Specter, Sanitizer, Prompt, Cipher, Lockdown, Siege, Compliance, Warden, Vector, Gatekeeper, Chaos, Passkey, Syringe, Phantom, Wallet, Weights, Egress, Tenant, Mirage, Exploit, Entropy, Vault, Recon, Gateway, Tripwire, Chaos, Vector, Sentinel, Compliance, Razor, Cipher, Lockdown, Infiltrator, Passkey, Specter, Sanitizer, Provenance, Syringe, Siege, Fuse, Prompt, Trace, Blacklist, Deadbolt, Phantom, Supply, Warden, Pedant, Gatekeeper, Harbor, Mirage, Wallet, Exploit, Tenant, Egress, Weights, Sentinel, Blacklist, Sanitizer, Harbor, Vector, Gatekeeper, Warden, Gateway, Recon, Passkey, Infiltrator, Razor, Chaos, Siege, Entropy, Compliance, Prompt, Deadbolt, Phantom, Lockdown, Syringe, Provenance, Supply, Cipher, Vault, Tripwire, Pedant, Trace, Fuse, Specter, Mirage, Wallet, Egress, Exploit, Tenant, Weights, Entropy, Harbor, Gateway, Syringe, Prompt, Tripwire, Deadbolt, Warden, Compliance, Pedant, Fuse, Infiltrator, Chaos, Gatekeeper, Passkey, Recon, Razor, Vault, Provenance, Lockdown, Sanitizer, Cipher, Phantom, Vector, Specter, Trace, Siege, Supply, Blacklist, Sentinel, Weights, Wallet, Mirage, Tenant, Egress, Exploit, Sanitizer, Trace, Prompt, Sentinel, Recon, Harbor, Blacklist, Passkey, Pedant, Vault, Provenance, Tripwire, Phantom, Gatekeeper, Chaos, Cipher, Siege, Vector, Warden, Deadbolt, Specter, Lockdown, Syringe, Entropy, Compliance, Gateway, Fuse, Razor, Infiltrator, Supply, Exploit, Wallet, Mirage, Weights, Egress, Tenant, Blacklist, Cipher, Supply, Syringe, Chaos, Warden, Specter, Gateway, Pedant, Tripwire, Harbor, Trace, Deadbolt, Sentinel, Siege, Vault, Prompt, Lockdown, Razor, Recon, Infiltrator, Phantom, Entropy, Provenance, Fuse, Vector, Compliance, Gatekeeper, Passkey, Sanitizer, Wallet, Mirage, Weights, Exploit, Tenant, Egress, Phantom, Tripwire, Blacklist, Gatekeeper, Supply, Harbor, Razor, Provenance, Fuse, Warden, Pedant, Cipher, Entropy, Vector, Chaos, Prompt, Trace, Vault, Siege, Syringe, Deadbolt, Passkey, Compliance, Sanitizer, Recon, Infiltrator, Sentinel, Specter, Lockdown, Gateway, Wallet, Exploit, Egress, Weights, Tenant, Mirage, Lockdown, Sentinel, Passkey, Chaos, Phantom, Cipher, Vault, Siege, Entropy, Sanitizer, Razor, Syringe, Supply, Warden, Fuse, Gatekeeper, Pedant, Provenance, Infiltrator, Deadbolt, Vector, Recon, Harbor, Specter, Prompt, Trace, Tripwire, Compliance, Gateway, Blacklist, Exploit, Wallet, Mirage, Weights, Egress, Tenant, Passkey, Entropy, Harbor, Gateway, Sanitizer, Recon, Tripwire, Chaos, Supply, Syringe, Compliance, Cipher, Blacklist, Provenance, Lockdown, Sentinel, Warden, Siege, Fuse, Gatekeeper, Razor, Deadbolt, Vector, Pedant, Vault, Specter, Prompt, Infiltrator, Phantom, Trace, Wallet, Tenant, Weights, Exploit, Mirage, Egress Total findings: 1264 Severity breakdown: 12 critical, 861 high, 345 medium, 35 low, 11 info