Exposure Surface
Maps common exposed HTTP endpoints on a given domain – such as security contact files, API documentation, health/diagnostics probes, and debug/admin panels.
This module helps you quickly understand what is publicly reachable and where sensitive or high-risk endpoints might be exposed.
- Probes a curated set of high-signal paths (e.g.
/.well-known/security.txt,/swagger,/healthz,/metrics,/phpinfo.php,/.env,/admin, etc.). - Classifies each path into categories such as:
security_contact– security.txt / vulnerability-disclosure files.api_docs– Swagger, OpenAPI, GraphQL UIs, API playgrounds.diagnostics– health, readiness, metrics, actuator endpoints.debug– phpinfo, debug toolbars, env/config dumps, admin consoles.
- Records:
- HTTP status code
- Whether the endpoint is present
- A status flag (
OK,INFO,WARN,FAIL) - Human-readable notes with quick context.
- Computes an overall_risk level and a list of key findings
(e.g.debug endpoint /.env is exposed with status 200 (FAIL).).
Typical questions this helps answer
-
Which “well-known” or high-risk endpoints are exposed on this host?
Quickly see if health checks, metrics, admin UIs, or debug pages are reachable from the internet. -
Is there any obvious misconfiguration like an exposed
.envor debug console?
Flags endpoints that commonly leak secrets, configuration, or internal system details. -
Do we publish a clear security contact (security.txt / disclosure policy)?
Checks for security contact files under standard.well-knownlocations. -
What should be prioritized in hardening or monitoring?
Use the categorized output + findings as a shortlist for remediation work and alerting.
Usage
For request format, parameters, and examples, see the Endpoint page in this module.
- Input: domain / origin (e.g.
indonesia.go.id) - Method: HTTP
GET - Output: JSON containing:
analysis.checks[]– per-path details (path, url, category, present, status_code, status, notes)analysis.overall_risk– aggregated qualitative risk (e.g.HIGH)analysis.findings[]– human-readable summary lines.
Notes
- The wordlist focuses on high-value & common patterns rather than blind brute force.
- A
404on most debug/diagnostics paths is expected and reported asINFO.
True issues usually appear asWARN/FAILwithpresent=true. - Treat the output as a starting point for manual verification, not a replacement for a full web app assessment.