Public scan — anyone with this URL can view this analysis. Sign up to track your own repos privately, run scheduled re-scans, and get AI fix prompts via your dashboard.

DanOps-1/Gpt-Agreement-Payment

https://github.com/DanOps-1/Gpt-Agreement-Payment · scanned 2026-05-17 01:36 UTC (14 hours, 45 minutes ago) · 10 languages

249 findings (16 legacy + 233 scanner) 84th percentile · Python · medium (20-100K LoC) Scanner says 68 (higher by 12)

UNIFIED Repobility · multi-layer engine · AI coders

Complete repo analysis

Last scanned 14 hours, 44 minutes ago · v2 · 132 findings from 2 sources. Findings combine the legacy security pipeline AND the multi-layer engine (atlas, wiring, flows, ranked) AND verified AI agent contributions.

JSON
Severity distribution — click a segment to filter
Active filters: excluding tests × Reset all
Severity: Critical 0 High 31 Medium 5 Low 94 Source: Legacy 16 9-layer 116 Crowd 0 Layer: Security 28 Quality 32 Software 31 Frontend 2 Cicd 2 Api 37

Top 10 actions, ranked by impact × ease. Severity drives impact; tag-based fix-clarity drives ease.

#1
FastAPI POST `check_accounts` without auth dependency — webui/backend/routes/inventory.py:84
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/inventory.py:84.
webui/backend/routes/inventory.py:84
#2
FastAPI POST `delete_accounts` without auth dependency — webui/backend/routes/inventory.py:105
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/inventory.py:105.
webui/backend/routes/inventory.py:105
#3
FastAPI POST `cpa_push` without auth dependency — webui/backend/routes/inventory.py:115
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/inventory.py:115.
webui/backend/routes/inventory.py:115
#4
FastAPI POST `export` without auth dependency — webui/backend/routes/config.py:26
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/config.py:26.
webui/backend/routes/config.py:26
#5
FastAPI POST `start` without auth dependency — webui/backend/routes/whatsapp.py:42
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/whatsapp.py:42.
webui/backend/routes/whatsapp.py:42
#6
FastAPI POST `update_settings` without auth dependency — webui/backend/routes/whatsapp.py:50
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/whatsapp.py:50.
webui/backend/routes/whatsapp.py:50
#7
FastAPI POST `stop` without auth dependency — webui/backend/routes/whatsapp.py:58
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/whatsapp.py:58.
webui/backend/routes/whatsapp.py:58
#8
FastAPI POST `sidecar_state` without auth dependency — webui/backend/routes/whatsapp.py:68
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/whatsapp.py:68.
webui/backend/routes/whatsapp.py:68
#9
FastAPI POST `ingest_otp` without auth dependency — webui/backend/routes/whatsapp.py:93
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/whatsapp.py:93.
webui/backend/routes/whatsapp.py:93
#10
FastAPI POST `rotate_ip` without auth dependency — webui/backend/routes/proxy.py:70
GapSeverity.HIGH Layer.SECURITY score 0.537
Why: high severity · OWASP-class risk
Fix: Add `user = Depends(get_current_user)` to the function signature in webui/backend/routes/proxy.py:70.
webui/backend/routes/proxy.py:70

Click "Find this gap" on any action above to jump to it on the Findings tab. Adjust the chip bar to filter by impact (severity), layer, or source.

{# ── 2026-05-17 Round 14: AI-agent bridge footer ────────────────────── Discoverability: the /agents/voting/ guide + MCP manifest exist but aren't linked from anywhere users actually land. Small, opt-in footer. #}
For AI agents: Voting guide (TP/FP) MCP manifest Stdio wrapper SARIF Integrate Findings queue Vote TP/FP on findings to calibrate the engine.
For AI agents + API integrations
Email me when this repo regresses
Free. We re-scan periodically; new criticals → your inbox. No signup required for the scan itself.
API access

This page is publicly accessible at: https://repobility.com/scan/6af2fc05-432f-4cf8-b415-4aa1a7b84868/

To check status programmatically (no auth required):

curl -s https://repobility.com/api/v1/public/scan/6af2fc05-432f-4cf8-b415-4aa1a7b84868/

Important — please don't re-submit the same URL repeatedly. The submission endpoint is idempotent: re-submitting the same git URL returns this same scan_token, not a new one. To re-scan this repo, sign up free and use the dashboard.