Deleted Users and Guest Users that Developed an App
There are 24 different applications and flows owned by 13 different deleted users. 11 are disabled and 13 are active. For example, Hila # from nokodsecurity developed 1 application in the Nokod environment.
Untrusted and Deprecated Connectors
There are 2 deprecated connectors in 2 environments. These connectors hold 9 connection instances.
For example, the connector Excel is deprecated, and 8 connection instances are found in your organization.
There are 4 untrusted connectors in 2 environments. These connectors hold 5 connection instances.
For example, the connector Ron Swanson Quotes (Independent Publisher) is untrusted, and 1 connection instance is found in your organization.
Bypass Consent
There are 2 applications that have the "Bypass Consent" feature enabled. This feature allows the application owner to access or change information on behalf of the application users, without their consent.
Need Help? Discuss Your Findings With Us.
We hope you find this report helpful. Feel free to share an anonymized subset of
your report data with Nokod and get further evaluation, benchmarks, and
remediation tips.