Reporte de Auditoría de Seguridad · v2.0
Grade: F
17282 hallazgos totales en 48 archivos · 27 tipos de vulnerabilidades
A07:2021-Identification-Auth-Failures
8403
A07:2021-Identification-Auth-Failures
A03:2021-Injection
5140
A03:2021-Injection
A07:2021-XSS
1968
A07:2021-XSS
A01:2021-Broken-Access-Control
823
A01:2021-Broken-Access-Control
A05:2021-Security-Misconfiguration
768
A05:2021-Security-Misconfiguration
A02:2021
110
Cryptographic Failures
A01:2021
60
Broken Access Control
A02:2021-Cryptographic Failures
4
A02:2021-Cryptographic Failures
A07:2021
3
Identification & Auth Failures
A04:2021
2
Insecure Design
A02:2021-Cryptographic-Failures
1
A02:2021-Cryptographic-Failures
| Severidad | Cantidad | Vulnerabilidad · Detalle · Mitigación |
|---|---|---|
|
🟡 WARNING
MEDIUM |
8400 |
A07:2021-Identification-Auth-Failures
CWE-208
Comparación de secretos con === — vulnerable a Timing Attack, usar crypto.timingSafeEqual 📁 10 archivos afectados
🛠 Mitigación recomendada — Timing Attack en comparación de secretos⚠️ Riesgo: La comparación con === tiene tiempo variable según el punto de fallo, permitiendo a un atacante adivinar tokens o hashes bit a bit mediante análisis de tiempo de respuesta. Pasos de remediación:
Ejemplo de código: const crypto = require('crypto');
const expected = Buffer.from(process.env.API_TOKEN);
const received = Buffer.from(req.headers['x-api-key'] || '');
if (expected.length !== received.length || !crypto.timingSafeEqual(expected, received)) {
return res.status(401).json({ error: 'Unauthorized' });
}
🎯 Vector de Pentest: Timing Attack, Token Brute Force |
| 🟡 WARNING | 271 |
A03:2021-Injection
CWE-95
setTimeout/setInterval con string en lugar de función — eval implícito 📁 10 archivos afectados
|
| 🟡 WARNING | 3892 |
A03:2021-Injection
CWE-1321
Asignación con propiedad dinámica puede contaminar __proto__ 📁 10 archivos afectados
|
|
🟡 WARNING
HIGH |
757 |
A01:2021-Broken-Access-Control
CWE-285
API Gateway sin whitelist de rutas — todas las acciones expuestas por defecto 📁 10 archivos afectados
🛠 Mitigación recomendada — API Gateway Moleculer sin whitelist de rutas⚠️ Riesgo: Sin whitelist, el gateway expone automáticamente todas las acciones de todos los servicios registrados, incluyendo acciones internas o de administración. Pasos de remediación:
Ejemplo de código: // Correcto
{
path: '/api',
whitelist: [
'users.login',
'users.register',
'products.list'
],
aliases: {
'POST /login': 'users.login',
'GET /products': 'products.list'
}
}
🎯 Vector de Pentest: Unauthorized API Access, Internal Action Exposure |
| 🟡 WARNING | 17 |
A01:2021-Broken-Access-Control
CWE-601
window.location con datos sin validar — posible Open Redirect 📁 10 archivos afectados
|
|
🟡 WARNING
HIGH |
1791 |
A07:2021-XSS
Salida directa sin sanitización (posible XSS) 📁 10 archivos afectados
🛠 Mitigación recomendada — Salida directa sin sanitización (XSS)⚠️ Riesgo: Imprimir datos sin sanitizar permite ataques Cross-Site Scripting que pueden robar sesiones o ejecutar código malicioso. Pasos de remediación:
Ejemplo de código: echo htmlspecialchars($var, ENT_QUOTES, 'UTF-8'); 🎯 Vector de Pentest: Reflected XSS, Stored XSS, Cookie Theft |
| 🟡 WARNING | 758 |
A05:2021-Security-Misconfiguration
CWE-1333
RegExp construido con input del usuario — posible ReDoS 📁 10 archivos afectados
|
| 🟡 WARNING | 8 |
A03:2021-Injection
CWE-1321
Object.assign con datos externos puede contaminar el prototipo 📁 8 archivos afectados
|
| 🟡 WARNING | 3 |
A07:2021-Identification-Auth-Failures
CWE-384
session_start() sin session_regenerate_id() en login — posible Session Fixation 📁 3 archivos afectados
|
| 🟡 WARNING | 60 |
A01:2021
Ruta Slim sin middleware de autenticación detectada 📁 10 archivos afectados
|
| 🟡 WARNING | 35 |
A01:2021-Broken-Access-Control
CWE-352
Formulario POST sin verificación de token CSRF 📁 10 archivos afectados
|
| 🟡 WARNING | 2 |
A04:2021
Input obtenido desde Slim Request sin validación explícita 📁 2 archivos afectados
|
| 🟡 WARNING | 7 |
A05:2021-Security-Misconfiguration
CWE-400
Upload sin verificar tamaño — posible DoS por archivos grandes 📁 7 archivos afectados
|
| 🟡 WARNING | 1 |
A07:2021
Algoritmo JWT potencialmente inseguro o no validado 📁 1 archivo afectado
|
| 🟡 WARNING | 1 |
A02:2021-Cryptographic-Failures
CWE-338
mt_rand()/rand() no son criptográficamente seguros — no usar para tokens 📁 1 archivo afectado
|
| 🔵 INFO | 14 |
A01:2021-Broken-Access-Control
CWE-285
fetch() a API interna sin header de Authorization — petición no autenticada 📁 10 archivos afectados
|
| 🔵 INFO | 3 |
A05:2021-Security-Misconfiguration
CWE-200
var_dump()/print_r() — posible exposición de datos en producción 📁 3 archivos afectados
|
|
🔴 ERROR
HIGH |
812 |
A03:2021-Injection
CWE-79
innerHTML/outerHTML con datos sin sanitizar — DOM XSS 📁 10 archivos afectados
🛠 Mitigación recomendada — innerHTML con datos sin sanitizar — DOM XSS⚠️ Riesgo: Asignar contenido sin sanitizar a innerHTML permite DOM-based XSS que ejecuta en el contexto del usuario, pudiendo robar cookies, tokens o realizar acciones en su nombre. Pasos de remediación:
Ejemplo de código: // Correcto — texto plano element.textContent = userInput; // Correcto — HTML sanitizado import DOMPurify from 'dompurify'; element.innerHTML = DOMPurify.sanitize(userInput); // Incorrecto element.innerHTML = userInput; 🎯 Vector de Pentest: DOM XSS, Cookie Theft, Session Hijacking |
| 🔴 ERROR | 32 |
A03:2021-Injection
CWE-79
insertAdjacentHTML con datos sin sanitizar — DOM XSS 📁 10 archivos afectados
|
| 🔴 ERROR | 6 |
A03:2021-Injection
CWE-79
document.write() con datos dinámicos — DOM XSS 📁 6 archivos afectados
|
|
🔴 ERROR
CRITICAL |
75 |
A03:2021-Injection
CWE-98
include/require con variable dinámica — posible LFI/RFI 📁 10 archivos afectados
🛠 Mitigación recomendada — include/require dinámico — LFI/RFI⚠️ Riesgo: Local File Inclusion permite leer archivos del servidor (/etc/passwd, logs) o ejecutar código. Remote File Inclusion permite cargar y ejecutar código desde un servidor remoto. Pasos de remediación:
Ejemplo de código: $allowed = ['home' => 'home.php', 'about' => 'about.php']; $page = $allowed[$_GET['page']] ?? 'home.php'; include 'pages/' . $page; 🎯 Vector de Pentest: Local File Inclusion (LFI), Remote File Inclusion (RFI) |
| 🔴 ERROR | 2 |
A03:2021-Injection
CWE-95
new Function() equivale a eval() — posible inyección de código 📁 2 archivos afectados
|
|
🔴 ERROR
HIGH |
2 |
A07:2021
JWT generado sin claim 'exp' 📁 2 archivos afectados
🛠 Mitigación recomendada — JWT sin expiración en PHP⚠️ Riesgo: Tokens sin expiración permiten accesos indefinidos. Si un token es comprometido, permanece válido para siempre. Pasos de remediación:
Ejemplo de código: $payload = ['sub' => $userId, 'exp' => time() + 3600, 'iat' => time()]; $token = JWT::encode($payload, $secretKey, 'HS256'); 🎯 Vector de Pentest: Token Replay, Session Persistence After Logout |
| 🔴 ERROR | 4 |
A02:2021-Cryptographic Failures
JWT::decode usado sin validación explícita de algoritmo 📁 4 archivos afectados
|
| 🔴 ERROR | 177 |
A07:2021-XSS
Datos del request enviados en la respuesta sin sanitización 📁 10 archivos afectados
|
| 🔴 ERROR | 35 |
A03:2021-Injection
Uso de input sin validación previa 📁 10 archivos afectados
|
|
🔴 ERROR
CRITICAL |
7 |
A03:2021-Injection
CWE-434
Upload de archivo sin validación de tipo MIME — posible subida de webshell 📁 7 archivos afectados
🛠 Mitigación recomendada — Upload de archivo sin validación de tipo — Webshell Upload⚠️ Riesgo: Sin validar el tipo de archivo, un atacante puede subir una webshell PHP (.php, .phtml, .php5) y ejecutar comandos en el servidor. Pasos de remediación:
Ejemplo de código: $allowed_ext = ['jpg', 'jpeg', 'png', 'gif', 'pdf'];
$ext = strtolower(pathinfo($_FILES['file']['name'], PATHINFO_EXTENSION));
if (!in_array($ext, $allowed_ext)) die('Tipo no permitido');
$finfo = finfo_open(FILEINFO_MIME_TYPE);
$mime = finfo_file($finfo, $_FILES['file']['tmp_name']);
if (!in_array($mime, ['image/jpeg', 'image/png'])) die('MIME no permitido');
$newname = bin2hex(random_bytes(16)) . '.' . $ext;
move_uploaded_file($_FILES['file']['tmp_name'], '/uploads/' . $newname);
🎯 Vector de Pentest: File Upload Bypass, Webshell Upload, RCE |
| Severidad | Tipo | Archivo : Línea | Descripción | Preview |
|---|---|---|---|---|
| HIGH | generic-api-key |
ws_hisPapel/envio.php : L3 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | DQCcwV*** |
| HIGH | generic-api-key |
ws_hisPapel/index.php : L3514 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | DQCcwV*** |
| HIGH | generic-api-key |
ws_hisPapel/index.php : L7229 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | DQCcwV*** |
| HIGH | generic-api-key |
ws_hisPapel/index.php : L7318 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | DQCcwV*** |
| HIGH | generic-api-key |
ws_hisPapel/index.php : L7264 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | DQCcwV*** |
| HIGH | generic-api-key |
ws_hisPapel/index.php : L4347 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | DQCcwV*** |
| HIGH | generic-api-key |
ws_hisPapel/index.php : L5024 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 3e711a*** |
| HIGH | generic-api-key |
ws_hisPapel/index.php : L5024 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 3e711a*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L2 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EB1Zj7*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L5 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EJ3i95*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L2 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EB1Zj7*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L5 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EJ3i95*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L9 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EAw-Il*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L2 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EB1Zj7*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L5 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EJ3i95*** |
| HIGH | generic-api-key |
ws_hisPapel/.env : L2 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | EB1Zj7*** |
| HIGH | generic-api-key |
front/docs/components/map.html : L229 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
front/docs/components/map.html : L258 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
front/docs/components/map.html : L287 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
front/docs/components/map.html : L316 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
front/docs/components/map.html : L345 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
front/src/data/mapbox_access_token.yml : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
ws_hisPapel/clsAuthentication.php : L8 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 68V0zW*** |
| HIGH | generic-api-key |
ws_hisPapel/clsAuthentication.php : L62 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 68V0zW*** |
| HIGH | generic-api-key |
ws_hisPapel/clsAuthentication.php : L100 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 68V0zW*** |
| HIGH | generic-api-key |
ws_hisPapel/clsAuthentication.php : L121 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 68V0zW*** |
| HIGH | generic-api-key |
assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L6 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | fef670*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L14 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | ed4c0d*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L22 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 0b53e8*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L30 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | b69ee2*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L38 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 33ec3a*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L46 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 845403*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L54 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | aecc1e*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L62 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 8abba6*** |
| HIGH | generic-api-key |
assets/json/api-key-list.json : L70 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 9e6d33*** |
| HIGH | generic-api-key |
assets/libs/quill/quill.min.js : L7 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | e.defa*** |
| HIGH | generic-api-key |
HTML/src/assets/js/pages/leaflet-map.init.js : L12 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/src/assets/js/pages/leaflet-map.init.js : L25 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/src/assets/js/pages/leaflet-map.init.js : L57 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/src/assets/js/pages/leaflet-map.init.js : L113 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/src/assets/js/pages/leaflet-map.init.js : L162 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L6 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | fef670*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L14 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | ed4c0d*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L22 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 0b53e8*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L30 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | b69ee2*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L38 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 33ec3a*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L46 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 845403*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L54 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | aecc1e*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L62 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 8abba6*** |
| HIGH | generic-api-key |
HTML/src/assets/json/api-key-list.json : L70 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 9e6d33*** |
| HIGH | gcp-api-key |
HTML/src/html/corporate/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/creative/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/default/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/galaxy/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/interactive/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/material/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/minimal/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/modern/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HTML/src/html/saas/maps-google.html : L108 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/js/pages/leaflet-map.init.js : L1 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | pk.eyJ*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L6 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | fef670*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L14 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | ed4c0d*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L22 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 0b53e8*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L30 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | b69ee2*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L38 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 33ec3a*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L46 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 845403*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L54 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | aecc1e*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L62 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 8abba6*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/json/api-key-list.json : L70 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 9e6d33*** |
| HIGH | generic-api-key |
HTML/dist/corporate/assets/libs/quill/quill.min.js : L7 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | e.defa*** |
| HIGH | gcp-api-key |
HTML/dist/corporate/maps-google.html : L2715 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | generic-api-key |
ws_hisPapel/middlewares/AESAlgorithm.php : L9 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | P3htbL*** |
| HIGH | generic-api-key |
ws_hisPapel/middlewares/AESAlgorithm.php : L10 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 32c3+3*** |
| HIGH | generic-api-key |
ws_hisPapel/middlewares/validateToken.php : L10 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | xNyle6*** |
| HIGH | private-key |
ws_hisPapel/vendor/firebase/php-jwt/README.md : L112 | Identified a Private Key, which may compromise cryptographic security and sensitive data encryption. | -----B*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L7 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | fef670*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L15 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | ed4c0d*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L23 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 0b53e8*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L31 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | b69ee2*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L39 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 33ec3a*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L47 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 845403*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L55 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | aecc1e*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L63 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 8abba6*** |
| HIGH | generic-api-key |
HEP_2024_frontend/src/common/data/apiKey.js : L71 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 9e6d33*** |
| HIGH | gcp-api-key |
HEP_2024_frontend/src/views/maps/google.vue : L303 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HEP_2024_frontend/src/views/maps/google.vue : L313 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HEP_2024_frontend/src/views/maps/google.vue : L329 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
HEP_2024_frontend/src/views/maps/google.vue : L341 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L7 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | fef670*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L15 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | ed4c0d*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L23 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 0b53e8*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L31 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | b69ee2*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L39 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 33ec3a*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L47 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 845403*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L55 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | aecc1e*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L63 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 8abba6*** |
| HIGH | generic-api-key |
template_corporate/src/common/data/apiKey.js : L71 | Detected a Generic API Key, potentially exposing access to various services and sensitive operations. | 9e6d33*** |
| HIGH | gcp-api-key |
template_corporate/src/views/maps/google.vue : L303 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
template_corporate/src/views/maps/google.vue : L313 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
template_corporate/src/views/maps/google.vue : L329 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
| HIGH | gcp-api-key |
template_corporate/src/views/maps/google.vue : L341 | Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches. | AIzaSy*** |
El agente IA analiza los hallazgos del proyecto y genera un reporte ejecutivo con contexto, priorización y recomendaciones de remediación específicas al stack detectado.
Registra el estado de cada remediación aplicada. Los datos se guardan en el navegador.
8400 ocurrencias en 10 archivo(s)
271 ocurrencias en 10 archivo(s)
3892 ocurrencias en 10 archivo(s)
757 ocurrencias en 10 archivo(s)
17 ocurrencias en 10 archivo(s)
1791 ocurrencias en 10 archivo(s)
758 ocurrencias en 10 archivo(s)
8 ocurrencias en 8 archivo(s)
3 ocurrencias en 3 archivo(s)
60 ocurrencias en 10 archivo(s)
35 ocurrencias en 10 archivo(s)
2 ocurrencias en 2 archivo(s)
7 ocurrencias en 7 archivo(s)
1 ocurrencias en 1 archivo(s)
1 ocurrencias en 1 archivo(s)
812 ocurrencias en 10 archivo(s)
32 ocurrencias en 10 archivo(s)
6 ocurrencias en 6 archivo(s)
75 ocurrencias en 10 archivo(s)
2 ocurrencias en 2 archivo(s)
2 ocurrencias en 2 archivo(s)
4 ocurrencias en 4 archivo(s)
177 ocurrencias en 10 archivo(s)
35 ocurrencias en 10 archivo(s)
7 ocurrencias en 7 archivo(s)
| Fecha | Proyecto | Score | Estado | Críticos | Secretos | Reporte |
|---|---|---|---|---|---|---|
| 04/03/2026 21:45 | SISTWEB_HenP_24 | 10 (F) | 🚨 Crítico | 1152 | 110 | Ver |