Documentation Index
Fetch the complete documentation index at: https://docs.qaos.machdel.com/llms.txt
Use this file to discover all available pages before exploring further.
Cryptographic vulnerabilities expose data in transit or allow traffic interception. These issues typically stem from missing or misconfigured security headers and overly permissive CORS policies.
misconfigured-security-headers
High What it is HTTP response headers that protect against common browser-side attacks are missing or misconfigured. These include HSTS, Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options. Why it matters Security headers are the browser’s last line of defense. Missing headers leave users vulnerable to downgrade attacks, clickjacking, MIME-type sniffing, and XSS escalation — even if the application code itself is secure. How QAOS detects it The agent checks HTTP response headers for the presence and correctness of key security headers. Commonly missing headers| Header | Risk if missing |
|---|---|
Strict-Transport-Security | HTTP downgrade attacks |
Content-Security-Policy | XSS escalation |
X-Frame-Options | Clickjacking |
X-Content-Type-Options | MIME sniffing |
Referrer-Policy | URL leakage |
misconfigured-cors
High What it is The server returnsAccess-Control-Allow-Origin: * (or reflects any origin) on endpoints that return sensitive data, allowing any website to make authenticated cross-origin requests and read the response.
Why it matters
A wildcard CORS policy combined with Access-Control-Allow-Credentials: true allows any malicious website to make requests to your API on behalf of your logged-in users and read the response. This effectively bypasses the Same-Origin Policy.
How QAOS detects it
The agent checks HTTP response headers for Access-Control-Allow-Origin: * or reflected origin values on sensitive API endpoints.
Examples