If we publish API or GET requests, sometimes someone can do a POST request of the API. Such security violations are not visible in the product. Other solutions provide such security features. The product does not provide visibility into the security loopholes in the authentication and authorization mechanism. The product must improve its security features. It has protection capabilities, but it must provide better visibility on the dashboard. The dashboard must be improved a lot.