| Target URL is tainted by user input | High | Step | Data Validation | CWE-22
                                            CWE-233
                                            CWE-918
                                            CWE-20 | 
                                
                                    | Unsafe regular expression | High | Step | Data Validation | CWE-1333 | 
                                
                                    | Unsafe variable is used to define host | High | Step | Data Validation | CWE-20 | 
                                
                                    | Use of weak hash algorithms | High | AssignMessage
                HMAC
                JavaScript | Secure Configuration | CWE-327 | 
                                
                                    | User-controlled data in ServiceCallout | High | Step | Data Validation | CWE-233
                                            CWE-20 | 
                                
                                    | AccessControl allows all IPs | Medium | AccessControl | Data Validation | CWE-290 | 
                                
                                    | Condition has undefined variables | Medium | Step
                RouteRule
                Flow | Code Quality | CWE-570
                                            CWE-571 | 
                                
                                    | Error flow variable is set but not checked in request phase | Medium | Step | Error Handling | CWE-390 | 
                                
                                    | Flow accepts requests with any method | Medium | Flow | Data Validation | CWE-749 | 
                                
                                    | Flow doesn't limit HTTP methods correctly | Medium | Flow | Data Validation | CWE-749 | 
                                
                                    | Insecure JSONThreatProtection policy | Medium | JSONThreatProtection | Code Quality
                Data Validation | CWE-770
                                            CWE-20 | 
                                
                                    | Insecure token expiration configuration | Medium | OAuthV2 | Secure Configuration | CWE-613 | 
                                
                                    | Lack of DefaultFaultRule | Medium | Target
                Proxy | Error Handling | CWE-390 | 
                                
                                    | Masked flow variable is written into unmasked one | Medium | Step | Data at Rest | CWE-532 | 
                                
                                    | MatchesPath is applied to a static parameter | Medium | Target
                Proxy | Code Quality
                Data Validation | CWE-20 | 
                                
                                    | No SpikeArrest policy is applied | Medium | Proxy | Code Quality
                DoS Protection | CWE-770 | 
                                
                                    | ServiceCallout policy uses default message object as a request | Medium | ServiceCallout | Code Quality | CWE-200 | 
                                
                                    | ServiceCallout policy uses default message object as a response | Medium | ServiceCallout | Code Quality | CWE-200 | 
                                
                                    | SpikeArrest uses user-controlled identifiers | Medium | Step | Code Quality
                Data Validation
                DoS Protection | CWE-770 | 
                                
                                    | Unreachable FaultRule | Medium | Target
                Proxy | Code Quality | CWE-561 |