Given that the endpoint is not protected, this is a potential security risk.
Given that the endpoint is not protected, this is a potential security risk.