This is not in any way considered a vulnerability. We simply list the analysed endpoints so it is clear to see which ones are included in the scan.


There are no risks or remediation methods for this issue. The information is only intended for the developer so that they are aware of what has been scanned and what has not.