MDX Limo
CASA Security Review — Executive Summary

CASA Security Review — Executive Summary

App: one-scan-to-rule-them-all · Target: agent.consul.so · Assessor: TAC Security (ESOF AppSec ADA) · Date: Feb 23–24, 2026 · Cyber Score: 9.4/10


Bottom Line

You pass. Google's CASA Tier 2 only requires remediation of Critical and High findings. Your report has zero of either. The remaining Low and Info items are configuration hardening suggestions and scanner noise — not security vulnerabilities.


What Was Found

SeverityCountBlocking?Status
Critical0Yes✅ Clear
High0Yes✅ Clear
Medium0Yes (revalidation)✅ Clear
Low2No⚠️ Open
Info7No⚠️ 6 Open, 1 Patched

The 2 Low Findings

  1. Cross-Domain CORS MisconfigurationAccess-Control-Allow-Origin: * is set on static assets. Fix: restrict the header to your own domain in Vercel config.

  2. Proxy Disclosure — Vercel is fingerprinted via TRACE/OPTIONS methods. Fix: disable TRACE method and suppress server version headers.


The 7 Info Findings

FindingReal RiskAction
X-Powered-By Header LeakNone✅ Already patched
Missing COOP HeaderMinimalAdd Cross-Origin-Opener-Policy: same-origin header
Suspicious CommentsNoneScanner false positives on minified JS (e.g., "SELECT", "QUERY" in React/Next.js code)
Modern Web ApplicationNoneScanner simply detected a SPA — not a vulnerability
Retrieved from CacheNoneVercel CDN behavior — verify sensitive routes use no-store
Storable Non-Cacheable ContentNoneInformational — static assets cached normally
User Agent FuzzerNoneScanner tested different user agents — no issues found

Why the Report Says "Fix Everything" but Google Doesn't

  • TAC Security's report states all vulnerabilities must be patched for Tier 2 — this is their internal policy.
  • Google's official FAQ states you need to remediate "critical or high findings" only.
  • ADA's Tier 2 criteria blocks only on CWEs with "high likelihood of exploit" — none of your findings qualify.

  1. Fix CORS + Proxy Disclosure — both are simple Vercel header configs and good practice regardless.
  2. Add COOP header — one-line addition to next.config.js or vercel.json.
  3. Dispute the rest — submit "not applicable" responses to TAC Security for the scanner-noise Info findings. Typical turnaround: 1–3 business days.
  4. Request your LOV — once TAC marks findings as resolved/disputed, they issue the Letter of Validation.
  5. Submit LOV to Google — verification typically granted within 5–6 business days.

SAQ (Self-Assessment Questionnaire)

All 54 OWASP ASVS-based requirements were answered "Yes — Applicable" with documented justifications. No gaps identified.


Assessment valid for 12 months. Annual revalidation required.