Hello Team,
I also reported this on e-mail but it fell to deaf ears. Today I discovered another security issues with Huntress SAT API.
If you really give a dime about security please start working on them:
  1. API scoping is dynamic when it shouldn't > This means if someone gets the API clientID and secret they can elevate permissions (and its not hard at all to get the secret as you'll see below). Lets say I create a client & then through a breach an attacker gets a hold of the client id and pass - using Huntress documentation he can add more scopes thus allowing him to move laterally. (e.g lets say I use the client with scope learners:manage to add new learners. If someone gets the client app and pass, using the Huntress API reference it can elevate the clients scope to assignments:learner-activity to check each user's traning results and send phishing e-mails to the ones with lower results which significantly increases the chances of a second breach)
  2. Client secrets can be viewed at any time - the secrets should only be viewable at creation time and this has been the default for all modern apps for ages. This limits the window of opportunity in case of a breach. Without it attackers can maintain persistence without anyone even noticing.