First Seen
Feb 18, 2026
Last Scanned
Feb 20, 2026
Findings
10
Score
28/100
Findings (10)
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects references to private/internal IP ranges in URL context
http://192.168.1.1/ Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.
Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.
Detects URLs fetched at runtime that control or influence agent behavior without pinning
get && sqlmap -u "http:// + rules Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.
Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.