Endpoints List Tab
A
The Endpoints Tab provides a detailed breakdown of each API endpoint that has been uploaded. This tab allows developers to analyze individual endpoints for vulnerabilities and assign roles for access control. Below is an explanation of each column in the table.
Method:
Displays the HTTP method used by the endpoint (e.g., GET, POST). A green checkmark indicates that the method is secure. A red warning icon indicates potential vulnerabilities in the method implementation.
Path:
Displays the full URL path of the endpoint (e.g., https://haircutkart.com/routes
). Provides the exact route being scanned, helping developers locate the specific resource or functionality within the API.
Risk Score:
Represents the severity of vulnerabilities for the endpoint, displayed as a combination of categories include Critical, High, or Medium. Numeric Score provides a quantitative value (e.g., 9.0 for Critical vulnerabilities).It helps developers prioritize fixes based on the severity of the issue.
Roles:
Displays and manages access control roles assigned to the endpoint. Shows roles currently assigned to the endpoint (e.g., Admin, User, Super Admin).
- Adding Roles: A
+
button allows users to add new roles from a dropdown list. Selectable roles include predefined options like Admin, User, and Super Admin. - Removing Roles: Clicking the
x
icon next to an assigned role removes it. Enables role-based access control, ensuring that only authorized roles can interact with the endpoint.
Scan Started:
Timestamp indicating when the endpoint was last scanned (e.g., "20 Aug, 2024 | 4:00 PM"). Tracks scan history to help identify if the endpoint has been updated or rescanned recently.
The Endpoints Tab provides granular control and visibility for managing API endpoint security and access control. The roles assignment feature is critical for implementing robust role-based access to APIs, reducing the attack surface while maintaining functionality.