Insecure HTTP transport
Outbound transport should not use plain HTTP for sensitive requests.
#Metadata
#Why it matters
Plain HTTP exposes traffic to interception and tampering.
#Remediation
Use HTTPS or a trusted local-development exception for non-production endpoints.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.insecure-http-transport.rule.yaml.