Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 20 additions & 4 deletions api-reference/enumerations/list-enumeration-misconfigurations.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,24 @@

| Type | Description |
|---|---|
| `dangling_dns` | DNS records pointing to resources that no longer exist, potentially vulnerable to subdomain takeover |
| `origin_exposure` | Backend origin IPs exposed behind CDN or proxy services |
| `dangling_dns` | AWS Elastic IPs that no longer exist, leaving DNS records vulnerable to subdomain takeover |

Check warning on line 9 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L9

Did you really mean 'IPs'?
| `origin_exposure` | Cloudflare-proxied origin IPs independently discoverable through other hostnames |

Check warning on line 10 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L10

Did you really mean 'IPs'?

Check warning on line 10 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L10

Did you really mean 'hostnames'?

### AWS Dangling DNS

A dangling DNS finding is reported when a DNS record points to an AWS Elastic IP that no longer exists, making it potentially vulnerable to subdomain takeover. Requires an AWS cloud integration.

### Cloudflare Origin IP Exposure

When a domain is proxied through Cloudflare, its origin server IP is hidden behind Cloudflare's network. An origin exposure finding indicates that this origin IP is independently discoverable through another hostname that resolves to it directly, without going through Cloudflare.

Check warning on line 18 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L18

Did you really mean 'proxied'?

Check warning on line 18 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L18

Did you really mean 'hostname'?

This finding requires two things:

1. **A Cloudflare cloud integration** — This allows us to read your DNS records and identify which hostnames are proxied and what origin IPs they point to.

Check warning on line 22 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L22

Did you really mean 'hostnames'?

Check warning on line 22 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L22

Did you really mean 'proxied'?

Check warning on line 22 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L22

Did you really mean 'IPs'?

2. **Asset inventory** — Hostnames and their resolved IPs from your attack surface discovery. The check runs against your entire inventory, excluding assets sourced from cloud integrations.

Check warning on line 24 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L24

Did you really mean 'Hostnames'?

Check warning on line 24 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L24

Did you really mean 'IPs'?

When a hostname from your inventory resolves to the same IP as the origin behind one of your proxied Cloudflare records, it is flagged as an origin exposure finding.

Check warning on line 26 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L26

Did you really mean 'hostname'?

Check warning on line 26 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L26

Did you really mean 'proxied'?

### Event Details by Finding Type

Expand All @@ -16,7 +32,7 @@
**`dangling_dns`**
| Field | Description |
|---|---|
| `host` | The vulnerable hostname |

Check warning on line 35 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L35

Did you really mean 'hostname'?
| `ip` | The dangling IP address |
| `provider` | Cloud provider (e.g., AWS) |

Expand All @@ -24,12 +40,12 @@
| Field | Description |
|---|---|
| `origin_ip` | The exposed origin server IP |
| `provider` | CDN provider (e.g., CloudFlare) |
| `leaking_hosts` | Hostnames leaking the origin IP |
| `provider` | CDN provider (e.g., Cloudflare) |
| `leaking_hosts` | The hostnames from your inventory that resolve directly to the origin IP |

Check warning on line 44 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L44

Did you really mean 'hostnames'?

## Example Requests

### List all misconfigurations

Check warning on line 48 in api-reference/enumerations/list-enumeration-misconfigurations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

api-reference/enumerations/list-enumeration-misconfigurations.mdx#L48

Did you really mean 'misconfigurations'?

```bash
curl -X GET "https://api.projectdiscovery.io/v1/asset/enumerate/misconfiguration?limit=50" \
Expand Down
4 changes: 4 additions & 0 deletions cloud/integrations.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
<Card title="Webhook" icon="webhook" href="#webhook">

</Card>
<Card title="Jira" icon="jira" href="#jira">

Check warning on line 21 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L21

Did you really mean 'Jira'?

</Card>
<Card title="GitHub" icon="github" href="#github">
Expand Down Expand Up @@ -48,7 +48,7 @@
<Card title="Cloudflare" icon="cloudflare" href="#cloudflare">

</Card>
<Card title="Fastly" icon="bolt" href="#fastly">

Check warning on line 51 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L51

Did you really mean 'Fastly'?

</Card>
<Card title="DigitalOcean" icon="digital-ocean" href="#digitalocean">
Expand Down Expand Up @@ -188,7 +188,7 @@
},

"finished": null,
"failed_stopped": null

Check warning on line 191 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L191

Did you really mean 'failed_stopped'?
}
```

Expand Down Expand Up @@ -276,8 +276,8 @@
- `medium` — Medium severity count
- `low` — Low severity count
- `info` — Info severity count
- `rescan_new_vulnerabilities` — New vulns since last scan, rescans only (integer)

Check warning on line 279 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L279

Did you really mean 'vulns'?

Check warning on line 279 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L279

Did you really mean 'rescans'?
- `rescan_vulns_list` — List of new vulnerabilities, **max 15 items**, rescans only (array)

Check warning on line 280 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L280

Did you really mean 'rescans'?
- `Name` — Vulnerability name/title
- `Severity` — Severity level (critical, high, medium, low, info)
- `Count` — Number of instances found
Expand Down Expand Up @@ -385,7 +385,7 @@
<Accordion title="Enumeration Finished" icon="circle-check">

<Info>
**Trigger:** When asset disocvery completes successfully

Check warning on line 388 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L388

Did you really mean 'disocvery'?

**Type:** `finished`
</Info>
Expand Down Expand Up @@ -442,7 +442,7 @@
- `total_assets` — Total number of assets in inventory (integer)
- `new_assets` — Number of newly discovered assets (integer)
- `new_assets_list` — Details of newly discovered assets (array)
- `host` — Hostname or domain name

Check warning on line 445 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L445

Did you really mean 'Hostname'?
- `port` — Port number
- `ip` — List of IP addresses associated with the host (array of strings)
</Accordion>
Expand Down Expand Up @@ -506,7 +506,7 @@

**Type:** `new_vuln`

**Note:** This event is only triggered for rescans when comparing against previous results

Check warning on line 509 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L509

Did you really mean 'rescans'?
</Info>

```json New Vulnerability Alert Payload
Expand Down Expand Up @@ -575,7 +575,7 @@
</Tip>

<Note>
If you configured severity filters (e.g., only Critical and High), only new vulnerabilities matching those severities will trigger this event and be included in the `rescan_vulns_list`.

Check warning on line 578 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L578

Did you really mean 'severities'?
</Note>
</Accordion>

Expand All @@ -586,7 +586,7 @@

**Type:** `new_asset`

**Configuration:** Can be enabled for disocvery, scan, or both based on your alerting configuration

Check warning on line 589 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L589

Did you really mean 'disocvery'?
</Info>

```json New Asset Alert Payload
Expand Down Expand Up @@ -651,7 +651,7 @@
- `total_assets` — Total number of assets in your inventory (integer)
- `new_assets` — **Number of NEWLY discovered assets** (integer)
- `new_assets_list` — **List of NEWLY discovered assets only** (array)
- `host` — Hostname or domain name

Check warning on line 654 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L654

Did you really mean 'Hostname'?
- `port` — Port number
- `ip` — List of IP addresses associated with the host (array of strings)
</Accordion>
Expand All @@ -667,7 +667,7 @@

## Ticketing Integrations

The integrations under Ticketing support ticketing functionality as part of scanning and include support for Jira, GitHub, GitLab, and Linear. Navigate to [Scans → Configurations → Ticketing](https://cloud.projectdiscovery.io/scans/configs?type=reporting) to configure your ticketing tools.

Check warning on line 670 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L670

Did you really mean 'Jira'?

<img
height="300"
Expand All @@ -676,9 +676,9 @@

### Jira

ProjectDiscovery provides integration support for Jira to create new tickets when vulnerabilities are found.

Check warning on line 679 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L679

Did you really mean 'Jira'?

Provide a name for the configuration, the Jira instance URL , the Account ID, the Email, and the associated API token.

Check warning on line 681 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L681

Did you really mean 'Jira'?

Details on creating an API token are available [in the Jira documentation here.](https://support.atlassian.com/atlassian-account/docs/manage-api-tokens-for-your-atlassian-account/)

Expand All @@ -689,7 +689,7 @@
Provide a name for the configuration, the Organization or username, Project name, Issue Assignee, Token, and Issue Label. The Issue Label determines when a ticket is created. (For example, if critical severity is selected, any issues with a critical severity will create a ticket.)

- The severity as label option adds a template result severity to any GitHub issues created.
- Deduplicate posts any new results as comments on existing issues instead of creating new issues for the same result.

Check warning on line 692 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L692

Did you really mean 'Deduplicate'?

Details on setting up access in GitHub [are available here.](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens)

Expand All @@ -701,7 +701,7 @@
(For example, if critical severity is selected, any issues with a critical severity will create a ticket.)

- The severity as label option adds a template result severity to any GitLab issues created.
- Deduplicate posts any new results as comments on existing issues instead of creating new issues for the same result.

Check warning on line 704 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L704

Did you really mean 'Deduplicate'?

Refer to GitLab's documentation for details on [configuring a Project Access token.](https://docs.gitlab.com/ee/user/project/settings/project_access_tokens.html#create-a-project-access-token)

Expand Down Expand Up @@ -756,7 +756,7 @@
Click here to open the AWS integration configuration page in the ProjectDiscovery Cloud platform
</Card>

ProjectDiscovery's AWS integration allows the platform to automatically discover and monitor cloud assets across your AWS accounts. By connecting AWS to ProjectDiscovery, security teams and DevOps engineers gain continuous visibility into EC2 instances, S3 buckets, DNS records, and other resources without manual inventory. This integration leverages ProjectDiscovery's open-source **Cloudlist** engine to enumerate assets via AWS APIs. In short, it helps ensure no cloud asset goes unnoticed, enabling proactive security monitoring and easier management of your attack surface.

Check warning on line 759 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L759

Did you really mean 'Cloudlist'?

<img
src="/images/aws-integration.png"
Expand All @@ -768,7 +768,7 @@

| Service | Description |
| :---------------------------------------------------- | :-------------------------------------------- |
| [EC2](https://aws.amazon.com/ec2/) | VM instances and their public IPs |

Check warning on line 771 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L771

Did you really mean 'IPs'?
| [Route53](https://aws.amazon.com/route53/) | DNS hosted zones and records |
| [S3](https://aws.amazon.com/s3/) | Buckets (especially those public or with DNS) |
| [Cloudfront](https://aws.amazon.com/cloudfront/) | CDN distributions and their domains |
Expand All @@ -776,8 +776,8 @@
| [EKS](https://aws.amazon.com/eks/) | Kubernetes cluster endpoints |
| [ELB](https://aws.amazon.com/elasticloadbalancing/) | Load balancers (Classic ELB and ALB/NLB) |
| [ELBv2](https://aws.amazon.com/elasticloadbalancing/) | Load balancers (Classic ELB and ALB/NLB) |
| [Lambda](https://aws.amazon.com/lambda/) | Serverless function endpoints |

Check warning on line 779 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L779

Did you really mean 'Serverless'?
| [Lightsail](https://aws.amazon.com/lightsail/) | Lightsail instances (simplified VPS) |

Check warning on line 780 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L780

Did you really mean 'Lightsail'?
| [Apigateway](https://aws.amazon.com/api-gateway/) | API endpoints deployed via Amazon API Gateway |

By covering these services, ProjectDiscovery can map out a broad range of AWS assets in your account. (Support for additional services may be added over time.)
Expand Down Expand Up @@ -856,7 +856,7 @@
- S3 - AmazonS3ReadOnlyAccess
- Lambda - AWSLambda_ReadOnlyAccess
- ELB - ElasticLoadBalancingReadOnly
- Cloudfront - CloudFrontReadOnlyAccess

Check warning on line 859 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L859

Did you really mean 'Cloudfront'?

Alternatively, you can use this custom policy for minimal permissions:

Expand Down Expand Up @@ -904,7 +904,7 @@
- **Troubleshooting Errors:** If the integration fails or some assets are missing, consider these common issues:
- _Incorrect Credentials:_ Double-check that the Access Key and Secret (if used) were entered correctly and correspond to an active IAM user. If you recently created the user, ensure you copied the keys exactly (no extra spaces or missing characters).
- _Insufficient Permissions:_ If certain services aren't showing up, the IAM policy might be missing permissions. For example, if S3 buckets aren't listed, confirm that the policy includes `s3:ListAllMyBuckets`. Refer back to the Required Permissions and make sure all relevant actions are allowed. You can also use AWS IAM Policy Simulator or CloudTrail logs to see if any **AccessDenied** errors occur when ProjectDiscovery calls AWS APIs.
- _Assume Role Failures:_ In multi-account or cross-account setups, a common issue is a misconfigured trust relationship. If ProjectDiscovery cannot assume a role, you might see an error in the UI or logs like "AccessDenied: Not authorized to perform sts:AssumeRole". In that case, check the following:

Check warning on line 907 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L907

Did you really mean 'misconfigured'?
- The trust policy of the IAM role (in target account) trusts the correct principal (either your primary account's IAM user/role ARN for multi-account, or ProjectDiscovery's external account ID for cross-account) and the External ID if applicable.
- The role name or ARN in the ProjectDiscovery config exactly matches the one in AWS (spelling/case must match).
- The primary credentials (for multi-account) have permission to call `AssumeRole`.
Expand All @@ -915,9 +915,9 @@

#### API Setup

You can set up the AWS integration entirely through the API. The process involves creating a cloudlist configuration, verifying it, and then using it to create an enumeration.

Check warning on line 918 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L918

Did you really mean 'cloudlist'?

The cloudlist configuration is a YAML array that must be **base64-encoded** before sending it to the API. Each connection method uses a different YAML structure, but the API calls are the same.

Check warning on line 920 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L920

Did you really mean 'cloudlist'?

**Configuration Format**

Expand All @@ -925,9 +925,9 @@
<Accordion title="Single AWS Account (Access Key & Secret)">
```yaml
- provider: aws
aws_access_key: "AKIAIOSFODNN7EXAMPLE"

Check warning on line 928 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L928

Did you really mean 'aws_access_key'?
aws_secret_key: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"

Check warning on line 929 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L929

Did you really mean 'aws_secret_key'?
aws_session_token: "optional-session-token"

Check warning on line 930 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L930

Did you really mean 'aws_session_token'?
services:
- ec2
- route53
Expand All @@ -938,10 +938,10 @@
<Accordion title="Multiple AWS Accounts (Assume Role)">
```yaml
- provider: aws
aws_access_key: "AKIAIOSFODNN7EXAMPLE"

Check warning on line 941 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L941

Did you really mean 'aws_access_key'?
aws_secret_key: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"

Check warning on line 942 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L942

Did you really mean 'aws_secret_key'?
assume_role_name: "ProjectDiscoveryReadOnlyRole"

Check warning on line 943 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L943

Did you really mean 'assume_role_name'?
account_ids:

Check warning on line 944 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L944

Did you really mean 'account_ids'?
- "123456789012"
- "987654321098"
services:
Expand All @@ -954,9 +954,9 @@
<Accordion title="Cross-Account Role (Role ARN)">
```yaml
- provider: aws
assume_role_arn: "arn:aws:iam::123456789012:role/ProjectDiscoveryRole"

Check warning on line 957 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L957

Did you really mean 'assume_role_arn'?
external_id: "your-external-id"

Check warning on line 958 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L958

Did you really mean 'external_id'?
assume_role_session_name: "projectdiscovery_role"

Check warning on line 959 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L959

Did you really mean 'assume_role_session_name'?

Check warning on line 959 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L959

Did you really mean 'projectdiscovery_role'?
services:
- ec2
- route53
Expand Down Expand Up @@ -1000,7 +1000,7 @@

**Step 2: Create the Integration**

Once verified, send the base64-encoded configuration to create a cloudlist config:

Check warning on line 1003 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1003

Did you really mean 'cloudlist'?

```bash
curl -X POST https://api.projectdiscovery.io/v1/scans/config \
Expand Down Expand Up @@ -1060,9 +1060,9 @@
|:---|:---|
| [Cloud DNS](https://cloud.google.com/dns) | DNS zones and records |
| [Kubernetes Engine](https://cloud.google.com/kubernetes-engine) | GKE cluster endpoints |
| [Compute Engine](https://cloud.google.com/products/compute) | VM instances and public IPs |

Check warning on line 1063 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1063

Did you really mean 'IPs'?
| [Cloud Storage](https://cloud.google.com/storage) | Buckets |
| [Cloud Functions](https://cloud.google.com/functions) | Serverless function endpoints |

Check warning on line 1065 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1065

Did you really mean 'Serverless'?
| [Cloud Run](https://cloud.google.com/run) | Container service URLs |

#### Enumeration Scope
Expand Down Expand Up @@ -1402,7 +1402,7 @@
<Note>
`YOUR_PROJECT_NUMBER` is the numeric project number, not the project ID. Find it with:
```bash
gcloud projects describe YOUR_PROJECT_ID --format='value(projectNumber)'

Check warning on line 1405 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1405

Did you really mean 'gcloud'?
```
</Note>

Expand Down Expand Up @@ -1616,7 +1616,7 @@

- If you only need specific services, you can further reduce actions. For example:
- Virtual machines: `Microsoft.Compute/virtualMachines/read`, plus RG/subscription reads
- Public IPs: `Microsoft.Network/publicIPAddresses/read`

Check warning on line 1619 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1619

Did you really mean 'IPs'?
- Traffic Manager: `Microsoft.Network/trafficManagerProfiles/read`
- Storage Accounts: `Microsoft.Storage/storageAccounts/read`
- AKS Clusters: `Microsoft.ContainerService/managedClusters/read`
Expand All @@ -1639,9 +1639,9 @@



### Alibaba Cloud

Check warning on line 1642 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1642

Did you really mean 'Alibaba'?

<Card title="Configure Alibaba Cloud Integration" icon="cloud" color="#FF6A00" href="https://cloud.projectdiscovery.io/assets/configure?provider=alibaba">

Check warning on line 1644 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1644

Did you really mean 'Alibaba'?
Click here to open the Alibaba Cloud integration configuration page in the ProjectDiscovery Cloud platform
</Card>

Expand All @@ -1652,13 +1652,13 @@
style={{ width:"62%" }}
/>

Supported Alibaba Cloud Services:

Check warning on line 1655 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1655

Did you really mean 'Alibaba'?

- ECS Instances

**Alibaba Integration Method**

Check warning on line 1659 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1659

Did you really mean 'Alibaba'?

This guide details the secure, best-practice method for connecting to Alibaba Cloud using a dedicated RAM user with read-only permissions.

Check warning on line 1661 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1661

Did you really mean 'Alibaba'?

1. **Create a RAM User for API Access:**
- Navigate to the **RAM (Resource Access Management) console**. [Ref](https://ram.console.aliyun.com/manage/ak)
Expand All @@ -1676,11 +1676,11 @@
- Select the **System Policy** type.
- Search for and select the `AliyunReadOnlyAccess` policy and click **OK**. This is the official, managed policy for read-only access to all cloud resources.
4. **Find Your Region ID and Connect:**
- Identify the **Region ID** for the resources you plan to monitor. You can find the official list in the Alibaba Cloud documentation here: [Regions and zones](https://www.alibabacloud.com/help/en/doc-detail/40654.htm) (This link lists the specific IDs required for API configuration).

Check warning on line 1679 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1679

Did you really mean 'Alibaba'?
- Use the credentials you have collected to fill in the fields in ProjectDiscovery:
- **Alibaba Region ID**: The target region, for example, `us-east-1`.

Check warning on line 1681 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1681

Did you really mean 'Alibaba'?
- **Alibaba Access Key**: The AccessKey ID from Step 2.

Check warning on line 1682 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1682

Did you really mean 'Alibaba'?
- **Alibaba Access Key Secret**: The AccessKey Secret from Step 2.

Check warning on line 1683 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1683

Did you really mean 'Alibaba'?
- Enter a unique **Integration Name** and click **Verify**.

References:
Expand Down Expand Up @@ -1721,8 +1721,8 @@
- Clusters with public IP addresses
</Note>

1. **Prepare Base64-Encoded Kubeconfig**

Check warning on line 1724 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1724

Did you really mean 'Kubeconfig'?
- Your kubeconfig file is typically located at:

Check warning on line 1725 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1725

Did you really mean 'kubeconfig'?

```
~/.kube/config
Expand All @@ -1732,11 +1732,11 @@
```
cat ~/.kube/config | base64
```
- Paste the output into the **Kubeconfig** field in the UI.

Check warning on line 1735 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1735

Did you really mean 'Kubeconfig'?

> ⚠️ Ensure the entire content is copied without extra whitespace.
2. **Specify Context (Optional)**
- If your kubeconfig has multiple contexts, find them with:

Check warning on line 1739 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1739

Did you really mean 'kubeconfig'?

```
kubectl config get-contexts
Expand All @@ -1755,7 +1755,7 @@

If your Kubernetes integration fails, the most common cause is cluster accessibility:

- **Internal Clusters**: Clusters only accessible within private networks (VPN, internal VPCs) cannot be reached by ProjectDiscovery

Check warning on line 1758 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1758

Did you really mean 'VPCs'?
- **Firewall Restrictions**: Ensure your cluster's API server and services are accessible from the internet
- **Network Policies**: Check that network policies allow external access to required endpoints
- **Load Balancer Configuration**: Verify that external load balancers are properly configured and accessible
Expand Down Expand Up @@ -1785,6 +1785,10 @@

- DNS and CDN assets

<Note>
Connecting a Cloudflare integration also enables **origin IP exposure** detection under [Misconfigurations](/api-reference/enumerations/list-enumeration-misconfigurations). When a hostname from your asset inventory resolves to the same IP as the origin behind one of your proxied Cloudflare records, it is flagged as an origin exposure finding.

Check warning on line 1789 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1789

Did you really mean 'hostname'?

Check warning on line 1789 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1789

Did you really mean 'proxied'?
</Note>

**Cloudflare Integration Methods:**

You can integrate Cloudflare into ProjectDiscovery via one of two methods:
Expand Down Expand Up @@ -1821,7 +1825,7 @@

### Fastly

<Card title="Configure Fastly Integration" icon="bolt" color="#FF282D" href="https://cloud.projectdiscovery.io/assets/configure?provider=fastly">

Check warning on line 1828 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1828

Did you really mean 'Fastly'?
Click here to open the Fastly integration configuration page in the ProjectDiscovery Cloud platform
</Card>

Expand All @@ -1832,16 +1836,16 @@
style={{ width:"65%" }}
/>

**Fastly Integration Method**

Check warning on line 1839 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1839

Did you really mean 'Fastly'?

- Go to Fastly [account settings](https://manage.fastly.com/account/personal).

Check warning on line 1841 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1841

Did you really mean 'Fastly'?
- Under **API**, click **Create API token** if you don’t already have one.
- Copy the API Key.
- Now enter API Key in ProjectDiscovery Cloud Platform.
- Give a unique Integration name and click **Verify**.

<Tip>
Tip: In Fastly's documentation and interfaces, "API Key" and "API Token" refer to the same thing. You can use the terms interchangeably throughout this guide.

Check warning on line 1848 in cloud/integrations.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

cloud/integrations.mdx#L1848

Did you really mean 'Fastly's'?
</Tip>

References:
Expand Down
6 changes: 3 additions & 3 deletions openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13959,7 +13959,7 @@ paths:
get:
summary: List Misconfiguration Findings
description: >-
Retrieve infrastructure misconfiguration findings discovered during asset enumeration, such as dangling DNS records and origin IP exposures.
Retrieve infrastructure misconfiguration findings discovered during asset enumeration. Currently detects AWS dangling DNS (Elastic IPs that no longer exist) and Cloudflare origin IP exposure.
tags: []
responses:
'200':
Expand Down Expand Up @@ -18561,7 +18561,7 @@ components:
enum:
- dangling_dns
- origin_exposure
description: Type of infrastructure misconfiguration
description: 'Type of misconfiguration: dangling_dns (AWS Elastic IP no longer exists) or origin_exposure (Cloudflare origin IP leaked)'
host:
type: string
description: The affected hostname or domain
Expand Down Expand Up @@ -18590,7 +18590,7 @@ components:
event:
type: object
additionalProperties: true
description: 'Type-specific finding details. For dangling_dns: host, ip, provider. For origin_exposure: provider, origin_ip, leaking_hosts.'
description: 'Type-specific finding details. For dangling_dns: host, ip, provider (AWS). For origin_exposure: provider (Cloudflare), origin_ip, leaking_hosts.'
created_at:
type: string
format: date
Expand Down
Loading