First Seen
Feb 18, 2026
Last Scanned
Feb 20, 2026
Findings
3
Score
50/100
Findings (3)
Detects cloud provider token and credential endpoints
oauth2.googleapis.com/token Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.
Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.
Detects cloud provider token and credential endpoints
oauth2.googleapis.com/token Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.
Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.
Detects patterns where external API responses are used directly without validation or sanitization
endpoint or invalid response + without use Validate and sanitize all data received from external APIs before using it in tool operations or agent prompts. Implement schema validation and treat API responses as untrusted input.
Likely FP if the match is a truncated table cell or documentation fragment that mentions API responses in a descriptive context, not actual unvalidated data processing.