diff --git a/doc/user/application_security/breach_and_attack_simulation/index.md b/doc/user/application_security/breach_and_attack_simulation/index.md
index 68f1f20bce6a30994b65c61d08a3c795af62cac8..bf26f6ac8a58990ab83fc75e6776537d69e2bbae 100644
--- a/doc/user/application_security/breach_and_attack_simulation/index.md
+++ b/doc/user/application_security/breach_and_attack_simulation/index.md
@@ -85,7 +85,7 @@ To maintain a separate DAST job while testing the BAS extended DAST image:
 
 To enable Breach and Attack Simulation features inside of an existing DAST job:
 
-1. Follow the steps in [Create a DAST CI/CD job](../dast/browser_based.md#create-a-dast-cicd-job).
+1. Follow the steps in [Create a DAST CI/CD job](../dast/browser/configuration/enabling_the_analyzer.md#create-a-dast-cicd-job).
 
 1. Extend DAST to using the [extends](../../../ci/yaml/yaml_optimization.md#use-extends-to-reuse-configuration-sections) keyword to your DAST job's configuration:
 
@@ -111,7 +111,7 @@ As with all projects, the items mentioned on this page are subject to change or
 The development, release, and timing of any products, features, or functionality remain at the
 sole discretion of GitLab Inc.
 
-Perform Out-of-Band Application Security Testing (OAST) for certain [active checks](../dast/checks/index.md#active-checks).
+Perform Out-of-Band Application Security Testing (OAST) for certain [active checks](../dast/browser/checks/index.md#active-checks).
 
 1. Extend the `.dast_with_bas_using_services` job configuration using the [extends](../../../ci/yaml/yaml_optimization.md#use-extends-to-reuse-configuration-sections) keyword:
 
@@ -141,7 +141,7 @@ Perform Out-of-Band Application Security Testing (OAST) for certain [active chec
 
 You can also manually enable callback attacks by making sure to:
 
-1. Set the `DAST_FF_ENABLE_BAS` [CI/CD variable](../dast/browser_based.md#available-cicd-variables) to `true`.
+1. Set the `DAST_FF_ENABLE_BAS` [CI/CD variable](../dast/browser/configuration/variables.md) to `true`.
 1. Enable both the application being tested and callback service container using [services](../../../ci/services/index.md).
 1. Enable container-to-container networking [making the callback service accessible](../../../ci/services/index.md#connecting-services) in the job.
 1. Set `DAST_BROWSER_CALLBACK` to include `Address:$YOUR_CALLBACK_URL` key/value pair where the callback service is accessible to the Runner/DAST container.
diff --git a/doc/user/application_security/dast/browser/checks/1336.1.md b/doc/user/application_security/dast/browser/checks/1336.1.md
new file mode 100644
index 0000000000000000000000000000000000000000..c64e8e4da162f6c4013d2d8a3c6299884d86e30d
--- /dev/null
+++ b/doc/user/application_security/dast/browser/checks/1336.1.md
@@ -0,0 +1,32 @@
+---
+stage: Secure
+group: Dynamic Analysis
+info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+---
+
+# Server-Side Template Injection
+
+## Description
+
+The application is vulnerable to Server-Side Template Injection (SSTI), which enables attackers to
+manipulate templates on the server side. This vulnerability arises when untrusted user input is
+directly used in server-side templates without adequate sanitization. Attackers can exploit this
+weakness to inject and execute arbitrary code in templates, potentially compromising the
+system's integrity and confidentiality.
+
+## Remediation
+
+User-controlled data should always have special elements neutralized when used as part of
+constructing Expression Language statements. Consult the documentation for the template
+system in use on how properly neutralize user-controlled data.
+
+## Details
+
+| ID | Aggregated | CWE | Type | Risk |
+|:---|:--------|:--------|:--------|:--------|
+| 1336.1 | false | 1336 | Active | high |
+
+## Links
+
+- [CWE](https://cwe.mitre.org/data/definitions/1336.html)
+- [Testing for Server-side Template Injection](https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server-side_Template_Injection)
diff --git a/doc/user/application_security/dast/browser/checks/16.11.md b/doc/user/application_security/dast/browser/checks/16.11.md
new file mode 100644
index 0000000000000000000000000000000000000000..e1d681b75c3425226d6658de2afd515a0e6ad7f5
--- /dev/null
+++ b/doc/user/application_security/dast/browser/checks/16.11.md
@@ -0,0 +1,40 @@
+---
+stage: Secure
+group: Dynamic Analysis
+info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+---
+
+# TRACE HTTP method enabled
+
+## Description
+
+The debug TRACE method was found to be enabled on the target web server. This
+HTTP method reflects HTTP request data back to the user in a response. In some circumstances
+this information may include sensitive data that is applied by intermediary proxies.
+
+## Remediation
+
+The TRACE HTTP method is for debugging only and should not be enabled on production
+sites.
+
+For Apache based web servers, ensure the `TraceEnable` directive is either removed or set to
+`off`.
+
+For Microsoft Servers, remove the registry parameter named "EnableTraceMethod" found in the below
+registry key:
+
+- `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters`
+
+For all other server types, consult your product's documentation on how to disable the TRACE method.
+
+## Details
+
+| ID | Aggregated | CWE | Type | Risk |
+|:---|:--------|:--------|:--------|:--------|
+| 16.11 | false | 16 | Active | high |
+
+## Links
+
+- [RFC](https://datatracker.ietf.org/doc/html/rfc9110.html#section-9.3.8)
+- [CWE](https://cwe.mitre.org/data/definitions/16.html)
+- [Apache TraceEnable](https://httpd.apache.org/docs/2.4/mod/core.html#traceenable)
diff --git a/doc/user/application_security/dast/browser/checks/74.1.md b/doc/user/application_security/dast/browser/checks/74.1.md
new file mode 100644
index 0000000000000000000000000000000000000000..4093c9f9fd083f8aca9ca2ee2d7a75e649d73227
--- /dev/null
+++ b/doc/user/application_security/dast/browser/checks/74.1.md
@@ -0,0 +1,31 @@
+---
+stage: Secure
+group: Dynamic Analysis
+info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+---
+
+# XSLT Injection
+
+## Description
+
+It is possible to supply an XSL template to a server-side XSLT processor. XSLT processors can
+be abused to read or write files, initiate outbound connections, and in some cases execute
+arbitrary code.
+
+## Remediation
+
+Applications should never accept user-supplied style sheets. XSLT processors are not built to
+handle potentially malicious stylesheet files. However, some processors do implement or offer
+security features which may be available. Consult the documentation for the XSLT processor
+used by the target application for security guidelines and hardening steps. It is recommended
+that all XML parsers and processors at the very least disable external entity resolution.
+
+## Details
+
+| ID | Aggregated | CWE | Type | Risk |
+|:---|:--------|:--------|:--------|:--------|
+| 74.1 | false | 74 | Active | high |
+
+## Links
+
+- [CWE](https://cwe.mitre.org/data/definitions/74.html)
diff --git a/doc/user/application_security/dast/browser/checks/78.1.md b/doc/user/application_security/dast/browser/checks/78.1.md
new file mode 100644
index 0000000000000000000000000000000000000000..177d7c00122446ff14a4d05674ea01484e371fd1
--- /dev/null
+++ b/doc/user/application_security/dast/browser/checks/78.1.md
@@ -0,0 +1,44 @@
+---
+stage: Secure
+group: Dynamic Analysis
+info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+---
+
+# OS Command Injection
+
+## Description
+
+It is possible to execute arbitrary OS commands on the target application server.
+OS Command Injection is a critical vulnerability that can lead to a full system
+compromise.
+
+## Remediation
+
+User input should never be used in constructing commands or command arguments
+to functions which execute OS commands. This includes filenames supplied by
+user uploads or downloads.
+
+Ensure your application does not:
+
+- Use user-supplied information in the process name to execute.
+- Use user-supplied information in an OS command execution function which does
+  not escape shell meta-characters.
+- Use user-supplied information in arguments to OS commands.
+
+The application should have a hardcoded set of arguments that are to be passed
+to OS commands. If filenames are being passed to these functions, it is
+recommended that a hash of the filename be used instead, or some other unique
+identifier. It is strongly recommended that a native library that implements
+the same functionality be used instead of using OS system commands due to the
+risk of unknown attacks against third party commands.
+
+## Details
+
+| ID | Aggregated | CWE | Type | Risk |
+|:---|:--------|:--------|:--------|:--------|
+| 78.1 | false | 78 | Active | high |
+
+## Links
+
+- [OWASP](https://owasp.org/www-community/attacks/Command_Injection)
+- [CWE](https://cwe.mitre.org/data/definitions/78.html)
diff --git a/doc/user/application_security/dast/browser/checks/918.1.md b/doc/user/application_security/dast/browser/checks/918.1.md
new file mode 100644
index 0000000000000000000000000000000000000000..9e4707e3a311fff010d339699b655d4947aa7a4d
--- /dev/null
+++ b/doc/user/application_security/dast/browser/checks/918.1.md
@@ -0,0 +1,33 @@
+---
+stage: Secure
+group: Dynamic Analysis
+info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+---
+
+# Server-Side Request Forgery
+
+## Description
+
+The application is susceptible to Server-Side Request Forgery (SSRF), a high-risk vulnerability
+that allows attackers to make unauthorized requests to internal and external resources. This
+vulnerability arises when user-controlled input is not properly validated or sanitized before
+being used in requests to resources, enabling attackers to manipulate these requests for
+malicious purposes.
+
+## Remediation
+
+Avoid using user-supplied data for constructing requests. If there is a business need for this,
+consider an allowlist approach and/or block requests to internal resources using firewall
+rules or a robust request library with anti-SSRF support.
+
+## Details
+
+| ID | Aggregated | CWE | Type | Risk |
+|:---|:--------|:--------|:--------|:--------|
+| 918.1 | false | 918 | Active | high |
+
+## Links
+
+- [CWE](https://cwe.mitre.org/data/definitions/918.html)
+- [OWASP](https://owasp.org/www-community/attacks/Server_Side_Request_Forgery)
+- [Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html)
diff --git a/doc/user/application_security/dast/browser/checks/98.1.md b/doc/user/application_security/dast/browser/checks/98.1.md
new file mode 100644
index 0000000000000000000000000000000000000000..8931bde2b57cd2ecaf86026dd75e7a50becb128d
--- /dev/null
+++ b/doc/user/application_security/dast/browser/checks/98.1.md
@@ -0,0 +1,34 @@
+---
+stage: Secure
+group: Dynamic Analysis
+info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+---
+
+# PHP Remote File Inclusion
+
+## Description
+
+The server is vulnerable to PHP Remote File Inclusion (RFI), which enables attackers to load
+remote files and have them executed as PHP scripts on the server side. This vulnerability occurs
+when untrusted user input is directly used in script inclusion without proper validation. Attackers
+can leverage this vulnerability to include and execute arbitrary remote files, potentially
+compromising the system's integrity and confidentiality.
+
+## Remediation
+
+Avoid using user-controlled data directly in `include` and `require` statements and instead consider
+an allow-list approach for dynamically including scripts.
+
+If possible, also consider setting `allow_url_include=Off` in the server's PHP configuration to
+ensure URLs cannot be used in `include` and `require` statements.
+
+## Details
+
+| ID | Aggregated | CWE | Type | Risk |
+|:---|:--------|:--------|:--------|:--------|
+| 98.1 | false | 98 | Active | high |
+
+## Links
+
+- [CWE](https://cwe.mitre.org/data/definitions/98.html)
+- [File inclusion Vulnerability - Wikipedia](https://en.wikipedia.org/wiki/File_inclusion_vulnerability)
diff --git a/doc/user/application_security/dast/browser_based.md b/doc/user/application_security/dast/browser_based.md
index 2fcb95b49a2f5899524ee81b9feeecd8347daaca..52af3f47739579fa10d661c15860c933676ea160 100644
--- a/doc/user/application_security/dast/browser_based.md
+++ b/doc/user/application_security/dast/browser_based.md
@@ -1,369 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: 'browser/index.md'
+remove_date: '2024-05-16'
 ---
 
-# DAST browser-based analyzer
+This document was moved to [another location](browser/index.md).
 
-DETAILS:
-**Tier:** Ultimate
-**Offering:** SaaS, Self-managed
-
-> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/323423) in GitLab 13.12 as a Beta feature.
-> - [Generally available](https://gitlab.com/groups/gitlab-org/-/epics/9023) in GitLab 15.7 (GitLab DAST v3.0.50).
-
-WARNING:
-Do not run DAST scans against a production server. Not only can it perform *any* function that
-a user can, such as clicking buttons or submitting forms, but it may also trigger bugs, leading to modification or loss of production data. Only run DAST scans against a test server.
-
-The DAST browser-based analyzer was built by GitLab to scan modern-day web applications for vulnerabilities.
-Scans run in a browser to optimize testing applications heavily dependent on JavaScript, such as single-page applications.
-See [how DAST scans an application](#how-dast-scans-an-application) for more information.
-
-To add the analyzer to your CI/CD pipeline, see [getting started](#getting-started).
-
-## How DAST scans an application
-
-A scan performs the following steps:
-
-1. [Authenticate](authentication.md), if configured.
-1. [Crawl](#crawling-an-application) the target application to discover the surface area of the application by performing user actions such as following links, clicking buttons, and filling out forms.
-1. [Passive scan](#passive-scans) to search for vulnerabilities in HTTP messages and pages discovered while crawling.
-1. [Active scan](#active-scans) to search for vulnerabilities by injecting payloads into HTTP requests recorded during the crawl phase.
-
-### Crawling an application
-
-A "navigation" is an action a user might take on a page, such as clicking buttons, clicking anchor links, opening menu items, or filling out forms.
-A "navigation path" is a sequence of navigation actions representing how a user might traverse an application.
-DAST discovers the surface area of an application by crawling pages and content and identifying navigation paths.
-
-Crawling is initialized with a navigation path containing one navigation that loads the target application URL in a specially-instrumented Chromium browser.
-DAST then crawls navigation paths until all have been crawled.
-
-To crawl a navigation path, DAST opens a browser window and instructs it to perform all the navigation actions in the navigation path.
-When the browser has finished loading the result of the final action, DAST inspects the page for actions a user might take,
-creates a new navigation for each found, and adds them to the navigation path to form new navigation paths. For example:
-
-1. DAST processes navigation path `LoadURL[https://example.com]`.
-1. DAST finds two user actions, `LeftClick[class=menu]` and `LeftClick[id=users]`.
-1. DAST creates two new navigation paths, `LoadURL[https://example.com] -> LeftClick[class=menu]` and `LoadURL[https://example.com] -> LeftClick[id=users]`.
-1. Crawling begins on the two new navigation paths.
-
-It's common for an HTML element to exist in multiple places in an application, such as a menu visible on every page.
-Duplicate elements can cause crawlers to crawl the same pages again or become stuck in a loop.
-DAST uses an element uniqueness calculation based on HTML attributes to discard new navigation actions it has previously crawled.
-
-### Passive scans
-
-Passive scans check for vulnerabilities in the pages discovered during the crawl phase of the scan.
-Passive scans are enabled by default.
-
-The checks search HTTP messages, cookies, storage events, console events, and DOM for vulnerabilities.
-Examples of passive checks include searching for exposed credit cards, exposed secret tokens, missing content security policies, and redirection to untrusted locations.
-
-See [checks](checks/index.md) for more information about individual checks.
-
-### Active scans
-
-Active scans check for vulnerabilities by injecting attack payloads into HTTP requests recorded during the crawl phase of the scan.
-Active scans are disabled by default due to the nature of their probing attacks.
-
-#### How active scans work
-
-DAST analyzes each recorded HTTP request for injection locations, such as query values, header values, cookie values, form posts, and JSON string values.
-Attack payloads are injected into the injection location, forming a new request.
-DAST sends the request to the target application and uses the HTTP response to determine attack success.
-
-Active scans run two types of active check:
-
-- A match response attack analyzes the response content to determine attack success. For example, if an attack attempts to read the system password file, a finding is created when the response body contains evidence of the password file.
-- A timing attack uses the response time to determine attack success. For example, if an attack attempts to force the target application to sleep, a finding is created when the application takes longer to respond than the sleep time. Timing attacks are repeated multiple times with different attack payloads to minimize false positives.
-
-A simplified timing attack works as follows:
-
-1. The crawl phase records the HTTP request `https://example.com?search=people`.
-1. DAST analyzes the URL and finds a URL parameter injection location `https://example.com?search=[INJECT]`.
-1. The active check defines a payload, `sleep 10`, that attempts to get a Linux host to sleep.
-1. DAST send a new HTTP request to the target application with the injected payload `https://example.com?search=sleep%2010`.
-1. The target application is vulnerable if it executes the query parameter value as a system command without validation, for example, `system(params[:search])`
-1. DAST creates a finding if the response time takes longer than 10 seconds.
-
-#### Known issues
-
-Active scans do not use a browser to send HTTP requests in an effort to minimize scan time.
-
-Anti-CSRF tokens are not regenerated for attacks that submit forms. Disable anti-CSRF tokens when running an active scan.
-
-## Getting started
-
-To run a DAST scan:
-
-- Read the [prerequisite](index.md#prerequisites) conditions for running a DAST scan.
-- Create a [DAST job](#create-a-dast-cicd-job) in your CI/CD pipeline.
-- [Authenticate](#authentication) as a user if your application requires it.
-
-### Create a DAST CI/CD job
-
-> - This template was [changed](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/62597) to DAST_VERSION: 2 in GitLab 14.0.
-> - This template was [changed](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/87183) to DAST_VERSION: 3 in GitLab 15.0.
-
-To add DAST scanning to your application, use the DAST job defined
-in the GitLab DAST CI/CD template file. Updates to the template are provided with GitLab
-upgrades, allowing you to benefit from any improvements and additions.
-
-To create the CI/CD job:
-
-1. Include the appropriate CI/CD template:
-
-    - [`DAST.gitlab-ci.yml`](https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/DAST.gitlab-ci.yml):
-      Stable version of the DAST CI/CD template.
-    - [`DAST.latest.gitlab-ci.yml`](https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/DAST.latest.gitlab-ci.yml):
-      Latest version of the DAST template. ([Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/254325)
-      in GitLab 13.8).
-
-   WARNING:
-   The latest version of the template may include breaking changes. Use the
-   stable template unless you need a feature provided only in the latest template.
-
-   For more information about template versioning, see the
-   [CI/CD documentation](../../../development/cicd/templates.md#latest-version).
-
-1. Add a `dast` stage to your GitLab CI/CD stages configuration.
-
-1. Define the URL to be scanned by DAST by using one of these methods:
-
-    - Set the `DAST_WEBSITE` [CI/CD variable](../../../ci/yaml/index.md#variables).
-      If set, this value takes precedence.
-
-    - Adding the URL in an `environment_url.txt` file at your project's root is great for testing in
-      dynamic environments. To run DAST against an application dynamically created during a GitLab CI/CD
-      pipeline, write the application URL to an `environment_url.txt` file. DAST automatically reads the
-      URL to find the scan target.
-
-      You can see an [example of this in our Auto DevOps CI YAML](https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Jobs/Deploy.gitlab-ci.yml).
-
-1. Set the `DAST_BROWSER_SCAN` [CI/CD variable](../../../ci/yaml/index.md#variables) to `"true"`.
-
-For example:
-
-```yaml
-stages:
-  - build
-  - test
-  - deploy
-  - dast
-
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_WEBSITE: "https://example.com"
-    DAST_BROWSER_SCAN: "true"
-```
-
-### Authentication
-
-The browser-based analyzer can authenticate a user prior to a scan. See [Authentication](authentication.md) for
-configuration instructions.
-
-### Available CI/CD variables
-
-These CI/CD variables are specific to the browser-based DAST analyzer. They can be used to customize the behavior of
-DAST to your requirements.
-For authentication CI/CD variables, see [Authentication](authentication.md).
-
-| CI/CD variable                              | Type                                                     | Example                                | Description                                                                                                                                                                                                                                                                   |
-|:--------------------------------------------|:---------------------------------------------------------|----------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| `DAST_ADVERTISE_SCAN`                       | boolean                                                  | `true`                                 | Set to `true` to add a `Via` header to every request sent, advertising that the request was sent as part of a GitLab DAST scan. The header value starts with `GitLab DAST`. [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/334947) in GitLab 14.1.                                                             |
-| `DAST_BROWSER_ACTION_STABILITY_TIMEOUT`     | [Duration string](https://pkg.go.dev/time#ParseDuration) | `800ms`                                | The maximum amount of time to wait for a browser to consider a page loaded and ready for analysis after completing an action.                                                                                                                                                 |
-| `DAST_BROWSER_ACTION_TIMEOUT`               | [Duration string](https://pkg.go.dev/time#ParseDuration) | `7s`                                   | The maximum amount of time to wait for a browser to complete an action.                                                                                                                                                                                                       |
-| `DAST_BROWSER_ALLOWED_HOSTS`                | List of strings                                          | `site.com,another.com`                 | Hostnames included in this variable are considered in scope when crawled. By default the `DAST_WEBSITE` hostname is included in the allowed hosts list. Headers set using `DAST_REQUEST_HEADERS` are added to every request made to these hostnames.                          |
-| `DAST_BROWSER_COOKIES`                      | dictionary                                               | `abtesting_group:3,region:locked`      | A cookie name and value to be added to every request.                                                                                                                                                                                                                         |
-| `DAST_BROWSER_CRAWL_GRAPH`                  | boolean                                                  | `true`                                 | Set to `true` to generate an SVG graph of navigation paths visited during crawl phase of the scan. You must also define `gl-dast-crawl-graph.svg` as a CI job artifact to be able to access the generated graph.                                                              |
-| `DAST_BROWSER_CRAWL_TIMEOUT`                | [Duration string](https://pkg.go.dev/time#ParseDuration) | `5m`                                   | The maximum amount of time to wait for the crawl phase of the scan to complete. Defaults to `24h`.                                                                                                                                                                            |
-| `DAST_BROWSER_DEVTOOLS_LOG`                 | string                                                   | `Default:messageAndBody,truncate:2000` | Set to log protocol messages between DAST and the Chromium browser.                                                                                                                                                                                                           |
-| `DAST_BROWSER_DOM_READY_AFTER_TIMEOUT`      | [Duration string](https://pkg.go.dev/time#ParseDuration) | `200ms`                                | Define how long to wait for updates to the DOM before checking a page is stable. Defaults to `500ms`.                                                                                                                                                                         |
-| `DAST_BROWSER_ELEMENT_TIMEOUT`              | [Duration string](https://pkg.go.dev/time#ParseDuration) | `600ms`                                | The maximum amount of time to wait for an element before determining it is ready for analysis.                                                                                                                                                                                |
-| `DAST_BROWSER_EXCLUDED_ELEMENTS`            | selector                                                 | `a[href='2.html'],css:.no-follow`      | Comma-separated list of selectors that are ignored when scanning.                                                                                                                                                                                                             |
-| `DAST_BROWSER_EXCLUDED_HOSTS`               | List of strings                                          | `site.com,another.com`                 | Hostnames included in this variable are considered excluded and connections are forcibly dropped.                                                                                                                                                                             |
-| `DAST_BROWSER_EXTRACT_ELEMENT_TIMEOUT`      | [Duration string](https://pkg.go.dev/time#ParseDuration) | `5s`                                   | The maximum amount of time to allow the browser to extract newly found elements or navigations.                                                                                                                                                                               |
-| `DAST_BROWSER_FILE_LOG`                     | List of strings                                          | `brows:debug,auth:debug`               | A list of modules and their intended logging level for use in the file log.                                                                                                                                                                                                   |
-| `DAST_BROWSER_FILE_LOG_PATH`                | string                                                   | `/output/browserker.log`               | Set to the path of the file log.                                                                                                                                                                                                                                              |
-| `DAST_BROWSER_IGNORED_HOSTS`                | List of strings                                          | `site.com,another.com`                 | Hostnames included in this variable are accessed, not attacked, and not reported against.                                                                                                                                                                                     |
-| `DAST_BROWSER_INCLUDE_ONLY_RULES`           | List of strings                                          | `16.1,16.2,16.3`                       | Comma-separated list of check identifiers to use for the scan.                                                                                                                                                                                                                |
-| `DAST_BROWSER_LOG`                          | List of strings                                          | `brows:debug,auth:debug`               | A list of modules and their intended logging level for use in the console log.                                                                                                                                                                                                |
-| `DAST_BROWSER_LOG_CHROMIUM_OUTPUT`          | boolean                                                  | `true`                                 | Set to `true` to log Chromium `STDOUT` and `STDERR`.                                                                                                                                                                                                                          |
-| `DAST_BROWSER_MAX_ACTIONS`                  | number                                                   | `10000`                                | The maximum number of actions that the crawler performs. For example, selecting a link, or filling a form.                                                                                                                                                                    |
-| `DAST_BROWSER_MAX_DEPTH`                    | number                                                   | `10`                                   | The maximum number of chained actions that the crawler takes. For example, `Click -> Form Fill -> Click` is a depth of three.                                                                                                                                                 |
-| `DAST_BROWSER_MAX_RESPONSE_SIZE_MB`         | number                                                   | `15`                                   | The maximum size of a HTTP response body. Responses with bodies larger than this are blocked by the browser. Defaults to 10 MB.                                                                                                                                               |
-| `DAST_BROWSER_NAVIGATION_STABILITY_TIMEOUT` | [Duration string](https://pkg.go.dev/time#ParseDuration) | `7s`                                   | The maximum amount of time to wait for a browser to consider a page loaded and ready for analysis after a navigation completes. Defaults to `800ms`.|
-| `DAST_BROWSER_NAVIGATION_TIMEOUT`           | [Duration string](https://pkg.go.dev/time#ParseDuration) | `15s`                                  | The maximum amount of time to wait for a browser to navigate from one page to another.                                                                                                                                                                                        |
-| `DAST_BROWSER_NUMBER_OF_BROWSERS`           | number                                                   | `3`                                    | The maximum number of concurrent browser instances to use. For shared runners on GitLab.com, we recommended a maximum of three. Private runners with more resources may benefit from a higher number, but are likely to produce little benefit after five to seven instances. |
-| `DAST_BROWSER_PAGE_LOADING_SELECTOR`        | selector                                                 | `css:#page-is-loading`                 | Selector that when is no longer visible on the page, indicates to the analyzer that the page has finished loading and the scan can continue. Cannot be used with `DAST_BROWSER_PAGE_READY_SELECTOR`.                                                                          |
-| `DAST_BROWSER_PAGE_READY_SELECTOR`          | selector                                                 | `css:#page-is-ready`                   | Selector that when detected as visible on the page, indicates to the analyzer that the page has finished loading and the scan can continue. Cannot be used with `DAST_BROWSER_PAGE_LOADING_SELECTOR`.                                                                         |
-| `DAST_BROWSER_PASSIVE_CHECK_WORKERS`        | int                                                      | `5`                                    | Number of workers that passive scan in parallel. Recommend setting to the number of available CPUs.                                                                                                                                                                           |
-| `DAST_BROWSER_SCAN`                         | boolean                                                  | `true`                                 | Required to be `true` to run a browser-based scan.                                                                                                                                                                                                                            |
-| `DAST_BROWSER_SEARCH_ELEMENT_TIMEOUT`       | [Duration string](https://pkg.go.dev/time#ParseDuration) | `3s`                                   | The maximum amount of time to allow the browser to search for new elements or user actions.                                                                                                                                                                                   |
-| `DAST_BROWSER_STABILITY_TIMEOUT`            | [Duration string](https://pkg.go.dev/time#ParseDuration) | `7s`                                   | The maximum amount of time to wait for a browser to consider a page loaded and ready for analysis.                                                                                                                                                                            |
-| `DAST_EXCLUDE_RULES`                        | string                                                   | `10020,10026`                          | Set to a comma-separated list of ZAP Vulnerability Rule IDs to exclude them from running during the scan. Rule IDs are numbers and can be found from the DAST log or on the [ZAP project](https://www.zaproxy.org/docs/alerts/).                                              |
-| `DAST_EXCLUDE_URLS`                         | URLs                                                     | `https://example.com/.*/sign-out`      | The URLs to skip during the authenticated scan; comma-separated. Regular expression syntax can be used to match multiple URLs. For example, `.*` matches an arbitrary character sequence.                                                                                     |
-| `DAST_FF_ENABLE_BAS`                        | boolean                                                  | `true`                                 | Set to `true` to [enable Breach and Attack Simulation](../breach_and_attack_simulation/index.md#extend-dynamic-application-security-testing-dast) during this DAST scan. |
-| `DAST_FULL_SCAN_ENABLED`                    | boolean                                                  | `true`                                 | Set to `true` to run both passive and active checks. Default: `false`                                                                                                                                                                                                         |
-| `DAST_PATHS`                                | string                                                   | `/page1.html,/category1/page3.html`    | Set to a comma-separated list of URL paths relative to `DAST_WEBSITE` for DAST to scan.                                                                                                                                                                                       |
-| `DAST_PATHS_FILE`                           | string                                                   | `/builds/project/urls.txt`             | Set to a file path containing a list of URL paths relative to `DAST_WEBSITE` for DAST to scan. The file must be plain text with one path per line.                                                                                                                            |
-| `DAST_PKCS12_CERTIFICATE_BASE64`            | string                                                   | `ZGZkZ2p5NGd...`                       | The PKCS12 certificate used for sites that require Mutual TLS. Must be encoded as base64 text.                                                                                                                                                                                |
-| `DAST_PKCS12_PASSWORD`                      | string                                                   | `password`                             | The password of the certificate used in `DAST_PKCS12_CERTIFICATE_BASE64`. Create sensitive [custom CI/CI variables](../../../ci/variables/index.md#define-a-cicd-variable-in-the-ui) using the GitLab UI.                                                                     |
-| `DAST_REQUEST_HEADERS`                      | string                                                   | `Cache-control:no-cache`               | Set to a comma-separated list of request header names and values.                                                                                                                                                                                                             |
-| `DAST_SKIP_TARGET_CHECK`                    | boolean                                                  | `true`                                 | Set to `true` to prevent DAST from checking that the target is available before scanning. Default: `false`.                                                                                                                                                                   |
-| `DAST_TARGET_AVAILABILITY_TIMEOUT`          | number                                                   | `60`                                   | Time limit in seconds to wait for target availability.                                                                                                                                                                                                                        |
-| `DAST_WEBSITE`                              | URL                                                      | `https://example.com`                  | The URL of the target application to scan.                                                                                                                                                                                                                                    |
-| `SECURE_ANALYZERS_PREFIX`                   | URL                                                      | `registry.organization.com`            | Set the Docker registry base address from which to download the analyzer.                                                                                                                                                                                                     |
-
-## Managing scope
-
-Scope controls what URLs DAST follows when crawling the target application. Properly managed scope minimizes scan run time while ensuring only the target application is checked for vulnerabilities.
-
-### Types of scope
-
-There are three types of scope:
-
-- in scope
-- out of scope
-- excluded from scope
-
-#### In scope
-
-DAST follows in-scope URLs and searches the DOM for subsequent actions to perform to continue the crawl.
-Recorded in-scope HTTP messages are passively checked for vulnerabilities and used to build attacks when running a full scan.
-
-#### Out of scope
-
-DAST follows out-of-scope URLs for non-document content types such as image, stylesheet, font, script, or AJAX request.
-[Authentication](#scope-works-differently-during-authentication) aside, DAST does not follow out-of-scope URLs for full page loads, such as when clicking a link to an external website.
-Except for passive checks that search for information leaks, recorded HTTP messages for out-of-scope URLs are not checked for vulnerabilities.
-
-#### Excluded from scope
-
-DAST does not follow excluded-from-scope URLs. Except for passive checks that search for information leaks, recorded HTTP messages for excluded-from-scope URLs are not checked for vulnerabilities.
-
-### Scope works differently during authentication
-
-Many target applications have an authentication process that depends on external websites, such as when using an identity access management provider for single sign on (SSO).
-To ensure that DAST can authenticate with these providers, DAST follows out-of-scope URLs for full page loads during authentication. DAST does not follow excluded-from-scope URLs.
-
-### How DAST blocks HTTP requests
-
-DAST instructs the browser to make the HTTP request as usual when blocking a request due to scope rules. The request is subsequently intercepted and rejected with the reason `BlockedByClient`.
-This approach allows DAST to record the HTTP request while ensuring it never reaches the target server. Passive checks such as [200.1](checks/200.1.md) use these recorded requests to verify information sent to external hosts.
-
-### How to configure scope
-
-By default, URLs matching the host of the target application are considered in-scope. All other hosts are considered out-of-scope.
-
-Scope is configured using the following variables:
-
-- Use `DAST_BROWSER_ALLOWED_HOSTS` to add in-scope hosts.
-- Use `DAST_BROWSER_IGNORED_HOSTS` to add to out-of-scope hosts.
-- Use `DAST_BROWSER_EXCLUDED_HOSTS` to add to excluded-from-scope hosts.
-- Use `DAST_EXCLUDE_URLS` to set specific URLs to be excluded-from-scope.
-
-Rules:
-
-- Excluding a host is given priority over ignoring a host, which is given priority over allowing a host.
-- Configuring scope for a host does not configure scope for the subdomains of that host.
-- Configuring scope for a host does not configure scope for all ports on that host.
-
-The following could be a typical configuration:
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_WEBSITE: "https://my.site.com"                   # my.site.com URLs are considered in-scope by default
-    DAST_BROWSER_ALLOWED_HOSTS: "api.site.com:8443"       # include the API as part of the scan
-    DAST_BROWSER_IGNORED_HOSTS: "analytics.site.com"      # explicitly disregard analytics from the scan
-    DAST_BROWSER_EXCLUDED_HOSTS: "ads.site.com"           # don't visit any URLs on the ads subdomain
-    DAST_EXCLUDE_URLS: "https://my.site.com/user/logout"  # don't visit this URL
-```
-
-## Vulnerability check migration
-
-A migration is underway that changes the browser-based analyzer from using the proxy-based analyzer Zed Attack Proxy (ZAP) active vulnerability checks, to using GitLab-built active vulnerability checks.
-
-The browser-based analyzer continues to use a combination of proxy-based analyzer and GitLab-built vulnerability checks until the migration is complete. See [browser-based vulnerability checks](checks/index.md) for details of which checks have been migrated.
-
-### Why browser-based scans produce different results to proxy-based scans
-
-Browser-based and proxy-based scans do not produce the same results because they use a different set of vulnerability checks.
-
-The browser-based analyzer does not have an equivalent for proxy-based checks that create too many false positives, are not worth running because modern browsers don't allow the vulnerability to be exploited, or are no longer considered relevant. The browser-based analyzer includes checks that proxy-based analyzer does not.
-
-## Managing scan time
-
-Running the browser-based crawler results in better coverage for many web applications when compared to the proxy-based scanner, and this increased coverage can come at a cost of increased scan time.
-
-Scan time is affected by:
-
-- The response time of the target site
-- The number of browsers concurrently running scans
-- The number and complexity of pages that are crawled
-- The number and complexity of security checks that are run
-
-You can manage the trade-off between coverage and scan time with the following measures:
-
-- Vertically scale the runner and use a higher number of browsers with the [variable](#available-cicd-variables) `DAST_BROWSER_NUMBER_OF_BROWSERS`. The default is `3`.
-- Limit the number of actions executed by the browser with the [variable](#available-cicd-variables) `DAST_BROWSER_MAX_ACTIONS`. The default is `10,000`.
-- Limit the page depth that the browser-based crawler checks coverage on with the [variable](#available-cicd-variables) `DAST_BROWSER_MAX_DEPTH`. The crawler uses a breadth-first search strategy, so pages with smaller depth are crawled first. The default is `10`.
-- Limit the time taken to crawl the target application with the [variable](#available-cicd-variables) `DAST_BROWSER_CRAWL_TIMEOUT`. The default is `24h`. Scans continue with passive and active checks when the crawler times out.
-- Build the crawl graph with the [variable](#available-cicd-variables) `DAST_BROWSER_CRAWL_GRAPH` to see what pages are being crawled.
-- Prevent pages from being crawled using the [variable](#available-cicd-variables) `DAST_EXCLUDE_URLS`.
-- Prevent elements being selected using the [variable](#available-cicd-variables) `DAST_BROWSER_EXCLUDED_ELEMENTS`. Use with caution, as defining this variable causes an extra lookup for each page crawled.
-- If the target application has minimal or fast rendering, consider reducing the [variable](#available-cicd-variables) `DAST_BROWSER_DOM_READY_AFTER_TIMEOUT` to a smaller value. The default is `500ms`.
-- Selectively include only specific security checks. Use this, for example, to target a vulnerability type, such as cross-site scripting. Consider using the [variable](#available-cicd-variables) `DAST_EXCLUDE_RULES` to exclude security checks your team is not concerned about or `DAST_BROWSER_INCLUDE_ONLY_RULES` to run only security checks your team is concerned about.
-
-## Timeouts
-
-Due to poor network conditions or heavy application load, the default timeouts may not be applicable to your application.
-
-Browser-based scans offer the ability to adjust various timeouts to ensure it continues smoothly as it transitions from one page to the next. These values are configured using a [Duration string](https://pkg.go.dev/time#ParseDuration), which allow you to configure durations with a prefix: `m` for minutes, `s` for seconds, and `ms` for milliseconds.
-
-Navigations, or the act of loading a new page, usually require the most amount of time because they are
-loading multiple new resources such as JavaScript or CSS files. Depending on the size of these resources, or the speed at which they are returned, the default `DAST_BROWSER_NAVIGATION_TIMEOUT` may not be sufficient.
-
-Stability timeouts, such as those configurable with `DAST_BROWSER_NAVIGATION_STABILITY_TIMEOUT`, `DAST_BROWSER_STABILITY_TIMEOUT`, and `DAST_BROWSER_ACTION_STABILITY_TIMEOUT` can also be configured. Stability timeouts determine when browser-based scans consider
-a page fully loaded. Browser-based scans consider a page loaded when:
-
-1. The [DOMContentLoaded](https://developer.mozilla.org/en-US/docs/Web/API/Window/DOMContentLoaded_event) event has fired.
-1. There are no open or outstanding requests that are deemed important, such as JavaScript and CSS. Media files are usually deemed unimportant.
-1. Depending on whether the browser executed a navigation, was forcibly transitioned, or action:
-
-   - There are no new Document Object Model (DOM) modification events after the `DAST_BROWSER_NAVIGATION_STABILITY_TIMEOUT`, `DAST_BROWSER_STABILITY_TIMEOUT`, or `DAST_BROWSER_ACTION_STABILITY_TIMEOUT` durations.
-
-After these events have occurred, browser-based scans consider the page loaded and ready, and attempt the next action.
-
-If your application experiences latency or returns many navigation failures, consider adjusting the timeout values such as in this example:
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_WEBSITE: "https://my.site.com"
-    DAST_BROWSER_NAVIGATION_TIMEOUT: "25s"
-    DAST_BROWSER_ACTION_TIMEOUT: "10s"
-    DAST_BROWSER_STABILITY_TIMEOUT: "15s"
-    DAST_BROWSER_NAVIGATION_STABILITY_TIMEOUT: "15s"
-    DAST_BROWSER_ACTION_STABILITY_TIMEOUT: "3s"
-```
-
-NOTE:
-Adjusting these values may impact scan time because they adjust how long each browser waits for various activities to complete.
-
-## Troubleshooting
-
-See [troubleshooting](browser_based_troubleshooting.md) for more information.
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/browser_based_troubleshooting.md b/doc/user/application_security/dast/browser_based_troubleshooting.md
index cf11fce84c3f00b9f04db2103686b5427ae2d248..05814cefa5fc6d055531154fbb24b2ce5f629cf5 100644
--- a/doc/user/application_security/dast/browser_based_troubleshooting.md
+++ b/doc/user/application_security/dast/browser_based_troubleshooting.md
@@ -1,304 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: 'browser/troubleshooting.md'
+remove_date: '2024-05-16'
 ---
 
-# Troubleshooting DAST browser-based analyzer
+This document was moved to [another location](browser/troubleshooting.md).
 
-DETAILS:
-**Tier:** Ultimate
-**Offering:** SaaS, Self-managed
-
-The following troubleshooting scenarios have been collected from customer support cases. If you
-experience a problem not addressed here, or the information here does not fix your problem, create a
-support ticket. For more details, see the [GitLab Support](https://about.gitlab.com/support/) page.
-
-## When something goes wrong
-
-When something goes wrong with a DAST scan, if you have a particular error message then check [known problems](#known-problems).
-
-Otherwise, try to discover the problem by answering the following questions:
-
-- [What is the expected outcome?](#what-is-the-expected-outcome)
-- [Is the outcome achievable by a human?](#is-the-outcome-achievable-by-a-human)
-- [Any reason why DAST would not work?](#any-reason-why-dast-would-not-work)
-- [How does your application work?](#how-does-your-application-work)
-- [What is DAST doing?](#what-is-dast-doing)
-
-### What is the expected outcome?
-
-Many users who encounter issues with a DAST scan have a good high-level idea of what they think the scanner should be doing. For example,
-it's not scanning particular pages, or it's not selecting a button on the page.
-
-As much as possible, try to isolate the problem to help narrow the search for a solution. For example, take the situation where DAST isn't scanning a particular page.
-From where should DAST have found the page? What path did it take to navigate there? Were there elements on the referring page that DAST should have selected, but did not?
-
-### Is the outcome achievable by a human?
-
-DAST cannot scan an application if a human cannot manually traverse the application.
-
-Knowing the outcome you expect, try to replicate it manually using a browser on your machine. For example:
-
-- Open a new incognito/private browser window.
-- Open Developer Tools. Keep an eye on the console for error messages.
-  - In Chrome: `View -> Developer -> Developer Tools`.
-  - In Firefox: `Tools -> Browser Tools -> Web Developer Tools`.
-- If authenticating:
-  - Navigate to the `DAST_AUTH_URL`.
-  - Type in the `DAST_USERNAME` in the `DAST_USERNAME_FIELD`.
-  - Type in the `DAST_PASSWORD` in the `DAST_PASSWORD_FIELD`.
-  - Select the `DAST_SUBMIT_FIELD`.
-- Select links and fill in forms. Navigate to the pages that aren't scanning correctly.
-- Observe how your application behaves. Notice if there is anything that might cause problems for an automated scanner.
-
-### Any reason why DAST would not work?
-
-DAST cannot scan correctly when:
-
-- There is a CAPTCHA. Turn these off in the testing environment for the application being scanned.
-- It does not have access to the target application. Ensure the GitLab Runner can access the application using the URLs used in the DAST configuration.
-
-### How does your application work?
-
-Understanding how your application works is vital to figuring out why a DAST scan isn't working. For example, the following situations
-may require additional configuration settings.
-
-- Is there a popup modal that hides elements?
-- Does a loaded page change dramatically after a certain period of time?
-- Is the application especially slow or fast to load?
-- Is the target application jerky while loading?
-- Does the application work differently based on the client's location?
-- Is the application a single-page application?
-- Does the application submit HTML forms, or does it use JavaScript and AJAX?
-- Does the application use websockets?
-- Does the application use a specific web framework?
-- Does selecting buttons run JavaScript before continuing the form submit? Is it fast, slow?
-- Is it possible DAST could be selecting or searching for elements before either the element or page is ready?
-
-### What is DAST doing?
-
-Logging remains the best way to understand what DAST is doing:
-
-- [Browser-based analyzer logging](#browser-based-analyzer-logging), useful for understanding what the analyzer is doing.
-- [Chromium DevTools logging](#chromium-devtools-logging), useful to inspect the communication between DAST and Chromium.
-- [Chromium Logs](#chromium-logs), useful for logging errors when Chromium crashes unexpectedly.
-
-## Browser-based analyzer logging
-
-The analyzer log is one of the most useful tools to help diagnose problems with a scan. Different parts of the analyzer can be logged at different levels.
-
-### Log message format
-
-Log messages have the format `[time] [log level] [log module] [message] [additional properties]`.
-
-For example, the following log entry has level `INFO`, is part of the `CRAWL` log module, has the message `Crawled path` and the additional properties `nav_id` and `path`.
-
-```txt
-2021-04-21T00:34:04.000 INF CRAWL Crawled path nav_id=0cc7fd path="LoadURL [https://my.site.com:8090]"
-```
-
-### Log destination
-
-Logs are sent either to file or to console (the CI/CD job log). You can configure each destination to accept different logs using
-the environment variables `DAST_BROWSER_LOG` for console logs and `DAST_BROWSER_FILE_LOG` for file logs.
-
-For example:
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_BROWSER_SCAN: "true"
-    DAST_BROWSER_LOG: "auth:debug"                               # console log defaults to INFO level, logs AUTH module at DEBUG
-    DAST_BROWSER_FILE_LOG: "loglevel:debug,cache:warn"           # file log defaults to DEBUG level, logs CACHE module at WARN
-    DAST_BROWSER_FILE_LOG_PATH: "$CI_PROJECT_DIR/dast-scan.log"  # Save the file log in the project directory so it can be recognized as an artifact
-  artifacts:
-    paths:
-      - dast-scan.log
-    when: always
-```
-
-### Log levels
-
-The log levels that can be configured are as follows:
-
-| Log module              | Component overview                                                       | More                             |
-|-------------------------|--------------------------------------------------------------------------|----------------------------------|
-| `TRACE`                 | Used for specific, often noisy inner workings of a feature.              |                                  |
-| `DEBUG`                 | Describes the inner-workings of a feature. Used for diagnostic purposes. |                                  |
-| `INFO`                  | Describes the high level flow of the scan and the results.               | Default level if none specified. |
-| `WARN`                  | Describes an error situation where DAST recovers and continues the scan. |                                  |
-| `FATAL`/`ERROR`/`PANIC` | Describes unrecoverable errors prior to exit.                            |                                  |
-
-### Log modules
-
-`LOGLEVEL` configures the default log level for the log destination. If any of the following modules are configured,
-DAST uses the log level for that module in preference to the default log level.
-
-The modules that can be configured for logging are as follows:
-
-| Log module | Component overview                                                                                |
-|------------|---------------------------------------------------------------------------------------------------|
-| `ACTIV`    | Used for active attacks.                                                                          |
-| `AUTH`     | Used for creating an authenticated scan.                                                          |
-| `BPOOL`    | The set of browsers that are leased out for crawling.                                             |
-| `BROWS`    | Used for querying the state or page of the browser.                                               |
-| `CACHE`    | Used for reporting on cache hit and miss for cached HTTP resources.                               |
-| `CHROM`    | Used to log Chrome DevTools messages.                                                             |
-| `CONTA`    | Used for the container that collects parts of HTTP requests and responses from DevTools messages. |
-| `CRAWL`    | Used for the core crawler algorithm.                                                              |
-| `DATAB`    | Used for persisting data to the internal database.                                                |
-| `LEASE`    | Used to create browsers to add them to the browser pool.                                          |
-| `MAIN`     | Used for the flow of the main event loop of the crawler.                                          |
-| `NAVDB`    | Used for persistence mechanisms to store navigation entries.                                      |
-| `REGEX`    | Used for recording performance statistics when running regular expressions.                       |
-| `REPT`     | Used for generating reports.                                                                      |
-| `STAT`     | Used for general statistics while running the scan.                                               |
-| `VLDFN`    | Used for loading and parsing vulnerability definitions.                                           |
-| `WEBGW`    | Used to log messages sent to the target application when running active checks.                   |
-
-### Example - log crawled paths
-
-Set the log module `CRAWL` to `DEBUG` to log navigation paths found during the crawl phase of the scan. This is useful for understanding
-if DAST is crawling your target application correctly.
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_BROWSER_LOG: "crawl:debug"
-```
-
-For example, the following output shows that four anchor links we discovered during the crawl of the page at `https://example.com`.
-
-```plaintext
-2022-11-17T11:18:05.578 DBG CRAWL executing step nav_id=6ec647d8255c729160dd31cb124e6f89 path="LoadURL [https://example.com]" step=1
-...
-2022-11-17T11:18:11.900 DBG CRAWL found new navigations browser_id=2243909820020928961 nav_count=4 nav_id=6ec647d8255c729160dd31cb124e6f89 of=1 step=1
-2022-11-17T11:18:11.901 DBG CRAWL adding navigation action="LeftClick [a href=/page1.html]" nav=bd458cc1fc2d7c6fb984464b6d968866 parent_nav=6ec647d8255c729160dd31cb124e6f89
-2022-11-17T11:18:11.901 DBG CRAWL adding navigation action="LeftClick [a href=/page2.html]" nav=6dcb25f9f9ece3ee0071ac2e3166d8e6 parent_nav=6ec647d8255c729160dd31cb124e6f89
-2022-11-17T11:18:11.901 DBG CRAWL adding navigation action="LeftClick [a href=/page3.html]" nav=89efbb0c6154d6c6d85a63b61a7cdc6f parent_nav=6ec647d8255c729160dd31cb124e6f89
-2022-11-17T11:18:11.901 DBG CRAWL adding navigation action="LeftClick [a href=/page4.html]" nav=f29b4f4e0bdee70f5255de7fc080f04d parent_nav=6ec647d8255c729160dd31cb124e6f89
-```
-
-## Chromium DevTools logging
-
-WARNING:
-Logging DevTools messages is a security risk. The output contains secrets such as usernames, passwords and authentication tokens.
-The output is uploaded to the GitLab server and may be visible in job logs.
-
-The DAST Browser-based scanner orchestrates a Chromium browser using the [Chrome DevTools Protocol](https://chromedevtools.github.io/devtools-protocol/).
-Logging DevTools messages helps provide transparency into what the browser is doing. For example, if selecting a button does not work, a DevTools message might show that the cause is a CORS error in a browser console log.
-Logs that contain DevTools messages can be very large in size. For this reason, it should only be enabled on jobs with a short duration.
-
-To log all DevTools messages, turn the `CHROM` log module to `trace` and configure logging levels. The following are examples of DevTools logs:
-
-```plaintext
-2022-12-05T06:27:24.280 TRC CHROM event received    {"method":"Fetch.requestPaused","params":{"requestId":"interception-job-3.0","request":{"url":"http://auth-auto:8090/font-awesome.min.css","method":"GET","headers":{"Accept":"text/css,*/*;q=0.1","Referer":"http://auth-auto:8090/login.html","User-Agent":"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/105.0.5195.102 Safari/537.36"},"initialPriority":"VeryHigh","referrerPolicy":"strict-origin-when-cross-origin"},"frameId":"A706468B01C2FFAA2EB6ED365FF95889","resourceType":"Stylesheet","networkId":"39.3"}} method=Fetch.requestPaused
-2022-12-05T06:27:24.280 TRC CHROM request sent      {"id":47,"method":"Fetch.continueRequest","params":{"requestId":"interception-job-3.0","headers":[{"name":"Accept","value":"text/css,*/*;q=0.1"},{"name":"Referer","value":"http://auth-auto:8090/login.html"},{"name":"User-Agent","value":"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/105.0.5195.102 Safari/537.36"}]}} id=47 method=Fetch.continueRequest
-2022-12-05T06:27:24.281 TRC CHROM response received {"id":47,"result":{}} id=47 method=Fetch.continueRequest
-```
-
-### Customizing DevTools log levels
-
-Chrome DevTools requests, responses and events are namespaced by domain. DAST allows each domain and each domain with message to have different logging configuration.
-The environment variable `DAST_BROWSER_DEVTOOLS_LOG` accepts a semi-colon separated list of logging configurations.
-Logging configurations are declared using the structure `[domain/message]:[what-to-log][,truncate:[max-message-size]]`.
-
-- `domain/message` references what is being logged.
-  - `Default` can be used as a value to represent all domains and messages.
-  - Can be a domain, for example, `Browser`, `CSS`, `Page`, `Network`.
-  - Can be a domain with a message, for example, `Network.responseReceived`.
-  - If multiple configurations apply, the most specific configuration is used.
-- `what-to-log` references whether and what to log.
-  - `message` logs that a message was received and does not log the message content.
-  - `messageAndBody` logs the message with the message content. Recommended to be used with `truncate`.
-  - `suppress` does not log the message. Used to silence noisy domains and messages.
-- `truncate` is an optional configuration to limit the size of the message printed.
-
-### Example - log all DevTools messages
-
-Used to log everything when you're not sure where to start.
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_BROWSER_FILE_LOG: "chrom:trace"
-    DAST_BROWSER_FILE_LOG_PATH: "/zap/wrk/dast-scan.log"
-    DAST_BROWSER_DEVTOOLS_LOG: "Default:messageAndBody,truncate:2000"
-  artifacts:
-    paths:
-      - dast-scan.log
-    when: always
-```
-
-### Example - log HTTP messages
-
-Useful for when a resource isn't loading correctly. HTTP message events are logged, as is the decision to continue or
-fail the request. Any errors in the browser console are also logged.
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_BROWSER_FILE_LOG: "chrom:trace"
-    DAST_BROWSER_FILE_LOG_PATH: "/zap/wrk/dast-scan.log"
-    DAST_BROWSER_DEVTOOLS_LOG: "Default:suppress;Fetch:messageAndBody,truncate:2000;Network:messageAndBody,truncate:2000;Log:messageAndBody,truncate:2000;Console:messageAndBody,truncate:2000"
-  artifacts:
-    paths:
-      - dast-scan.log
-    when: always
-```
-
-## Chromium logs
-
-In the rare event that Chromium crashes, it can be helpful to write the Chromium process `STDOUT` and `STDERR` to log.
-Setting the environment variable `DAST_BROWSER_LOG_CHROMIUM_OUTPUT` to `true` achieves this purpose.
-
-DAST starts and stops many Chromium processes. DAST sends each process output to all log destinations with the log module `LEASE` and log level `INFO`.
-
-For example:
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_BROWSER_LOG_CHROMIUM_OUTPUT: "true"
-```
-
-## Known problems
-
-### Logs contain `response body exceeds allowed size`
-
-By default DAST processes HTTP requests where the HTTP response body is 10 MB or less. Otherwise, DAST blocks the response
-which can cause scans to fail. This constraint is intended to reduce memory consumption during a scan.
-
-An example log is as follows, where DAST blocked the JavaScript file found at `https://example.com/large.js` as it's size is greater than the limit:
-
-```plaintext
-2022-12-05T06:28:43.093 WRN BROWS response body exceeds allowed size allowed_size_bytes=1000000 browser_id=752944257619431212 nav_id=ae23afe2acbce2c537657a9112926f1a of=1 request_id=interception-job-2.0 response_size_bytes=9333408 step=1 url=https://example.com/large.js
-2022-12-05T06:28:58.104 WRN CONTA request failed, attempting to continue scan error=net::ERR_BLOCKED_BY_RESPONSE index=0 requestID=38.2 url=https://example.com/large.js
-```
-
-This can be changed using the configuration `DAST_MAX_RESPONSE_SIZE_MB`. For example,
-
-```yaml
-include:
-  - template: DAST.gitlab-ci.yml
-
-dast:
-  variables:
-    DAST_MAX_RESPONSE_SIZE_MB: "25"
-```
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/1004.1.md b/doc/user/application_security/dast/checks/1004.1.md
index 52d256bfed6a48af959373b2833e4ffbfc64fc30..9e7d60e12450db46d565d1d6cf963d2dd3e4e021 100644
--- a/doc/user/application_security/dast/checks/1004.1.md
+++ b/doc/user/application_security/dast/checks/1004.1.md
@@ -1,41 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/1004.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Sensitive cookie without HttpOnly attribute
+This document was moved to [another location](../browser/checks/798.9.md).
 
-## Description
-
-The cookie was transmitted in a `Set-Cookie` header without the `HttpOnly` attribute set.
-To prevent JavaScript being able to access the cookie value - usually via `document.cookies` - all
-cookies that are used for authorization should have the `HttpOnly` attribute
-set.
-
-## Remediation
-
-Most web application frameworks allow configuring how cookies are sent to user-agents. Consult your framework's
-documentation for more information on how to enable various security directives when assigning cookies to clients.
-
-If the application is assigning cookies via writing to the response headers directly, ensure all responses include
-the `HttpOnly` attribute. By enabling this protection, the application is able to mitigate the impact of
-certain Cross-Site Scripting (XSS) attacks.
-
-Example:
-
-```http
-Set-Cookie: {cookie_name}=<random secure value>; HttpOnly
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 1004.1 | false | 1004 | Passive | Low |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/HttpOnly)
-- [CWE](https://cwe.mitre.org/data/definitions/1004.html)
-- [Mozilla MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#restrict_access_to_cookies)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/113.1.md b/doc/user/application_security/dast/checks/113.1.md
index 864bb8db5bd404811ea1b7f29300746b0164a8da..0713f9da31e7f65e6f526d5d98f29b26be927832 100644
--- a/doc/user/application_security/dast/checks/113.1.md
+++ b/doc/user/application_security/dast/checks/113.1.md
@@ -1,27 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/113.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Improper Neutralization of CRLF Sequences in HTTP Headers
+This document was moved to [another location](../browser/checks/113.1.md).
 
-## Description
-
-By inserting Carriage Return / Line Feed (CRLF) characters, malicious users could potentially inject arbitrary data into HTTP responses. By modifying HTTP responses, attackers could conduct cross-site scripting or cache poisoning attacks against other users of the system.
-
-## Remediation
-
-User input should never be used in constructing HTTP header responses without some form
-of validation against newlines. This includes URLs supplied by the user for HTTP redirects.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 113.1 | false | 113 | Active | high |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/attacks/HTTP_Response_Splitting)
-- [CWE](https://cwe.mitre.org/data/definitions/113.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/1336.1.md b/doc/user/application_security/dast/checks/1336.1.md
index c64e8e4da162f6c4013d2d8a3c6299884d86e30d..31069266ba4eaf745894e81359f18c0b6c23152d 100644
--- a/doc/user/application_security/dast/checks/1336.1.md
+++ b/doc/user/application_security/dast/checks/1336.1.md
@@ -1,32 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/1336.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Server-Side Template Injection
+This document was moved to [another location](../browser/checks/1336.1.md).
 
-## Description
-
-The application is vulnerable to Server-Side Template Injection (SSTI), which enables attackers to
-manipulate templates on the server side. This vulnerability arises when untrusted user input is
-directly used in server-side templates without adequate sanitization. Attackers can exploit this
-weakness to inject and execute arbitrary code in templates, potentially compromising the
-system's integrity and confidentiality.
-
-## Remediation
-
-User-controlled data should always have special elements neutralized when used as part of
-constructing Expression Language statements. Consult the documentation for the template
-system in use on how properly neutralize user-controlled data.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 1336.1 | false | 1336 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/1336.html)
-- [Testing for Server-side Template Injection](https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server-side_Template_Injection)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.1.md b/doc/user/application_security/dast/checks/16.1.md
index 0341774916cacbf50b4ddfb1480b3c6e9fd93d81..d6edae003ce7f86b8317865b1d0c60871ed4c12c 100644
--- a/doc/user/application_security/dast/checks/16.1.md
+++ b/doc/user/application_security/dast/checks/16.1.md
@@ -1,33 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Missing Content-Type header
+This document was moved to [another location](../browser/checks/16.1.md).
 
-## Description
-
-The `Content-Type` header ensures that user agents correctly interpret the data being received. Without this header
-being sent, the browser may misinterpret the data, leading to MIME confusion attacks. If an attacker were able
-to upload files that are accessible by using a browser, they could upload files that may be interpreted as
-HTML and so execute Cross-Site Scripting (XSS) attacks.
-
-## Remediation
-
-Ensure all resources return a proper `Content-Type` header that matches their format. As an example,
-when returning JavaScript files, the response header should be: `Content-Type: application/javascript`
-
-For added protection, we recommend that all resources return the `X-Content-Type-Options: nosniff`
-header to disable user agents from mis-interpreting resources.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.1 | true | 16 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [Mozilla Blog on MIME Confusion attacks](https://blog.mozilla.org/security/2016/08/26/mitigating-mime-confusion-attacks-in-firefox/)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.10.md b/doc/user/application_security/dast/checks/16.10.md
index bb7ea7425273cb4cac7076ddf3d4d64b16335797..4225887828feb4f2b76cb5857895bb08815d9f27 100644
--- a/doc/user/application_security/dast/checks/16.10.md
+++ b/doc/user/application_security/dast/checks/16.10.md
@@ -1,30 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.10.md'
+remove_date: '2024-05-16'
 ---
 
-# Content-Security-Policy violations
+This document was moved to [another location](../browser/checks/16.10.md).
 
-## Description
-
-A `Content-Security-Policy` (CSP) was identified on the target site that is reporting violations when
-attempting to load the page in a browser. This may cause disruption to your users when attempting to visit the page.
-
-## Remediation
-
-Review the violations to determine if any action is necessary.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.10 | true | 16 | Passive | Info |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html)
-- [MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP)
-- [Content Security Policy Level 3](https://www.w3.org/TR/CSP3/)
-- [CSP Evaluator](https://csp-evaluator.withgoogle.com/)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.11.md b/doc/user/application_security/dast/checks/16.11.md
index e1d681b75c3425226d6658de2afd515a0e6ad7f5..4ee0cd8924b69692d4f1b4b7285e26ae2a3d7a05 100644
--- a/doc/user/application_security/dast/checks/16.11.md
+++ b/doc/user/application_security/dast/checks/16.11.md
@@ -1,40 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.11.md'
+remove_date: '2024-05-16'
 ---
 
-# TRACE HTTP method enabled
+This document was moved to [another location](../browser/checks/16.11.md).
 
-## Description
-
-The debug TRACE method was found to be enabled on the target web server. This
-HTTP method reflects HTTP request data back to the user in a response. In some circumstances
-this information may include sensitive data that is applied by intermediary proxies.
-
-## Remediation
-
-The TRACE HTTP method is for debugging only and should not be enabled on production
-sites.
-
-For Apache based web servers, ensure the `TraceEnable` directive is either removed or set to
-`off`.
-
-For Microsoft Servers, remove the registry parameter named "EnableTraceMethod" found in the below
-registry key:
-
-- `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters`
-
-For all other server types, consult your product's documentation on how to disable the TRACE method.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.11 | false | 16 | Active | high |
-
-## Links
-
-- [RFC](https://datatracker.ietf.org/doc/html/rfc9110.html#section-9.3.8)
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [Apache TraceEnable](https://httpd.apache.org/docs/2.4/mod/core.html#traceenable)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.2.md b/doc/user/application_security/dast/checks/16.2.md
index 6c145803146b19116ee74110131f422bb672b5c2..844dc11f5166636128badcea6ec1ec9e6dabc312 100644
--- a/doc/user/application_security/dast/checks/16.2.md
+++ b/doc/user/application_security/dast/checks/16.2.md
@@ -1,44 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Server header exposes version information
+This document was moved to [another location](../browser/checks/16.2.md).
 
-## Description
-
-The target website returns the `Server` header and version information of this website. By
-exposing these values, attackers may attempt to identify if the target software is vulnerable to known
-vulnerabilities, or catalog known sites running particular versions to exploit in the future when a
-vulnerability is identified in the particular version.
-
-## Remediation
-
-We recommend that the version information be removed from the `Server` header.
-
-Apache:
-For Apache based web sites, set the `ServerTokens` to `Prod` in the `httpd.conf` configuration file.
-
-NGINX:
-For NGINX based websites, set the `server_tokens` configuration value to `off` in the `nginx.conf` file.
-
-IIS:
-For IIS based websites version 10 and above you can use the `removeServerHeader` element to the `requestFiltering`
-section of the `Web.config` file.
-
-For all other server types, consult your product's documentation on how to redact the version information from
-the `Server` header.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.2 | true | 16 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [Apache ServerTokens](https://blog.mozilla.org/security/2016/08/26/mitigating-mime-confusion-attacks-in-firefox/)
-- [NGINX `server_tokens`](https://nginx.org/en/docs/http/ngx_http_core_module.html#server_tokens)
-- [IIS 10 Remove Server Header](https://learn.microsoft.com/en-us/iis/configuration/system.webserver/security/requestfiltering/#attributes)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.3.md b/doc/user/application_security/dast/checks/16.3.md
index 8678a923433d221d0979061fd494888479366b9e..1e4e0ebdd975dc17bd4844f8ce3c476f204345c4 100644
--- a/doc/user/application_security/dast/checks/16.3.md
+++ b/doc/user/application_security/dast/checks/16.3.md
@@ -1,35 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.3.md'
+remove_date: '2024-05-16'
 ---
 
-# X-Powered-By header exposes version information
+This document was moved to [another location](../browser/checks/16.3.md).
 
-## Description
-
-The target website returns the `X-Powered-By` header and version information of this website. By
-exposing these values, attackers may attempt to identify if the target software is vulnerable to known
-vulnerabilities, or catalog known sites running particular versions to exploit in the future when a
-vulnerability is identified in the particular version.
-
-## Remediation
-
-We recommend that the version information be removed from the `X-Powered-By` header.
-
-PHP:
-For PHP based web sites, set the `expose_php` option to `off` in the `php.ini` configuration file.
-
-For all other server types, consult your product's documentation on how to redact the version
-information from the `X-Powered-By` header.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.3 | true | 16 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [PHP `expose_php`](https://www.php.net/manual/en/ini.core.php#ini.expose-php)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.4.md b/doc/user/application_security/dast/checks/16.4.md
index 93f464e26db581ca0d85fec15d21c479bd864040..3518c35227cc09060eb4d5bc9ec40d1af340d904 100644
--- a/doc/user/application_security/dast/checks/16.4.md
+++ b/doc/user/application_security/dast/checks/16.4.md
@@ -1,28 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.4.md'
+remove_date: '2024-05-16'
 ---
 
-# X-Backend-Server header exposes server information
+This document was moved to [another location](../browser/checks/16.4.md).
 
-## Description
-
-The target website returns the `X-Backend-Server` header which includes potentially internal/hidden IP addresses
-or hostnames. By exposing these values, attackers may attempt to circumvent security proxies and access these
-hosts directly.
-
-## Remediation
-
-Consult your proxy/load balancer documentation or provider on how to disable revealing the
-`X-Backend-Server` header value.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.4 | true | 16 | Passive | Info |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.5.md b/doc/user/application_security/dast/checks/16.5.md
index 522db17a9a43de25c6a60d1a87325bc6f322ab73..c70042e476c23d199deb6fb31dacc6690e211810 100644
--- a/doc/user/application_security/dast/checks/16.5.md
+++ b/doc/user/application_security/dast/checks/16.5.md
@@ -1,30 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.5.md'
+remove_date: '2024-05-16'
 ---
 
-# AspNet header exposes version information
+This document was moved to [another location](../browser/checks/16.5.md).
 
-## Description
-
-The target website returns AspNet headers and version information of this website. By
-exposing these values attackers may attempt to identify if the target software is vulnerable to known
-vulnerabilities, or catalog known sites running particular versions to exploit in the future when a
-vulnerability is identified in the particular version.
-
-## Remediation
-
-To remove the `X-AspNet-Version` header set `<httpRuntime enableVersionHeader="false" />` in the `<system.Web>`
-section of the `Web.config` file.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.5 | true | 16 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [IIS Remove Unwanted Headers](https://techcommunity.microsoft.com/t5/iis-support-blog/remove-unwanted-http-response-headers/ba-p/369710)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.6.md b/doc/user/application_security/dast/checks/16.6.md
index 2d68de913c27e2acfb788d69c100285ac1af76b2..abde06b8b6a5f485496968c0b7f4f71d294a6e23 100644
--- a/doc/user/application_security/dast/checks/16.6.md
+++ b/doc/user/application_security/dast/checks/16.6.md
@@ -1,37 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.6.md'
+remove_date: '2024-05-16'
 ---
 
-# AspNetMvc header exposes version information
+This document was moved to [another location](../browser/checks/16.6.md).
 
-## Description
-
-The target website returns AspNet headers along with version information of this website. By
-exposing these values attackers may attempt to identify if the target software is vulnerable to known
-vulnerabilities. Or catalog known sites running particular versions to exploit in the future when a
-vulnerability is identified in the particular version.
-
-## Remediation
-
-To remove the `X-AspNetMvc-Version` information set `MvcHandler.DisableMvcResponseHeader = true;` in the
-`Global.asax.cs` file in the `Application_Start()` method.
-
-```cs
-protected void Application_Start()
-{
-    MvcHandler.DisableMvcResponseHeader = true;
-}
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.6 | true | 16 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [IIS Remove Unwanted Headers](https://techcommunity.microsoft.com/t5/iis-support-blog/remove-unwanted-http-response-headers/ba-p/369710)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.7.md b/doc/user/application_security/dast/checks/16.7.md
index e170246e01c47afad6eed18f7c48a3dbc4fe3873..f834c89003de8fdc66cf83b9c29819fdad5e5a87 100644
--- a/doc/user/application_security/dast/checks/16.7.md
+++ b/doc/user/application_security/dast/checks/16.7.md
@@ -1,41 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.7.md'
+remove_date: '2024-05-16'
 ---
 
-# Strict-Transport-Security header missing or invalid
+This document was moved to [another location](../browser/checks/16.7.md).
 
-## Description
-
-The `Strict-Transport-Security` header was found to be missing or invalid. The `Strict-Transport-Security`
-header allows web site operators to force communications to occur over a TLS connection. By enabling this
-header, websites can protect their users from various forms of network eavesdropping or interception attacks.
-While most browsers prevent mixed-content (loading resources from HTTP when navigating from an HTTPS site),
-this header also ensures that all resource requests are only ever initiated over a secure transport.
-
-## Remediation
-
-Only three directives are applicable for the `Strict-Transport-Security` header.
-
-1. `max-age`: This required directive specifies how long (in seconds) after receiving the response it should communicate only over a secure transport.
-1. `includeSubDomains`: This optional, valueless directive signals that the policy applies to this host as well as any subdomains found under this host's domain.
-1. `preload`: While not part of the specification, setting this optional value allows major browser organizations to add this site into the browser's preloaded set of HTTPS sites. This requires further action on behalf of the website operator to submit their domain to the browser's HSTS preload list. See [hstspreload.org](https://hstspreload.org/) for more information.
-
-Note that invalid directives, or the `Strict-Transport-Security` header appearing more than once (if the values are
-different) is considered invalid.
-
-Prior to adding to this security configuration to your website, it is recommended you review the hstspreload.org [Deployment Recommendations](https://hstspreload.org/#deployment-recommendations).
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.7 | true | 16 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [Deployment Recommendations](https://hstspreload.org/#deployment-recommendations)
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.html)
-- [RFC](https://datatracker.ietf.org/doc/html/rfc6797)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.8.md b/doc/user/application_security/dast/checks/16.8.md
index 6e2bb10291d45e313ac755bb243be72c4d8af146..cb8a073c6faa8f15b9ba2733becf20d84529b515 100644
--- a/doc/user/application_security/dast/checks/16.8.md
+++ b/doc/user/application_security/dast/checks/16.8.md
@@ -1,31 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.8.md'
+remove_date: '2024-05-16'
 ---
 
-# Content-Security-Policy analysis
+This document was moved to [another location](../browser/checks/16.8.md).
 
-## Description
-
-A missing or invalid `Content-Security-Policy` (CSP) was identified on the target site. CSP can aid in
-hardening a website against various client side attacks such as Cross-Site Scripting (XSS).
-
-## Remediation
-
-If the target site is missing a CSP, investigate the relevant URLs for enabling CSP. Otherwise,
-follow the recommendations to determine if any actions are necessary.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.8 | true | 16 | Passive | Info |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html)
-- [MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP)
-- [Content Security Policy Level 3](https://www.w3.org/TR/CSP3/)
-- [CSP Evaluator](https://csp-evaluator.withgoogle.com/)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/16.9.md b/doc/user/application_security/dast/checks/16.9.md
index 75cc7fd2c692eb98e07e1d7a3a05adb1774c2ac2..9d548415e5b31588b1111e6cbc7c1668b5f5f996 100644
--- a/doc/user/application_security/dast/checks/16.9.md
+++ b/doc/user/application_security/dast/checks/16.9.md
@@ -1,32 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/16.9.md'
+remove_date: '2024-05-16'
 ---
 
-# Content-Security-Policy-Report-Only analysis
+This document was moved to [another location](../browser/checks/16.9.md).
 
-## Description
-
-A `Content-Security-Policy-Report-Only` (CSPRO) was identified on the target site. CSP-Report-Only headers
-aid in determining how to implement a `Content-Security-Policy` that does not disrupt normal use of the target
-site.
-
-## Remediation
-
-Follow the recommendations to determine if any actions are necessary to harden this `Content-Security-Policy-Report-Only`.
-After all alerts have been resolved, we recommend that this header be changed to `Content-Security-Policy`.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 16.9 | true | 16 | Passive | Info |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/16.html)
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html)
-- [MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP)
-- [Content Security Policy Level 3](https://www.w3.org/TR/CSP3/)
-- [CSP Evaluator](https://csp-evaluator.withgoogle.com/)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/200.1.md b/doc/user/application_security/dast/checks/200.1.md
index d004614087556a27e2867c9523452af0ddba0e0f..61f2939e27251f4d6aceafee859382b4e934c0ce 100644
--- a/doc/user/application_security/dast/checks/200.1.md
+++ b/doc/user/application_security/dast/checks/200.1.md
@@ -1,30 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/200.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of sensitive information to an unauthorized actor (private IP address)
+This document was moved to [another location](../browser/checks/200.1.md).
 
-## Description
-
-A private RFC 1918/RFC 4193 address was identified in the target application. Public facing websites should not be issuing
-requests to private IP Addresses. Attackers attempting to execute subsequent attacks, such as Server-Side
-Request Forgery (SSRF), may be able to use this information to identify additional internal targets.
-
-## Remediation
-
-Identify the resource that is incorrectly specifying an internal IP address and replace it with it's public
-facing version, or remove the reference from the target application.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 200.1 | true | 200 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/200.html)
-- [RFC](https://datatracker.ietf.org/doc/html/rfc1918)
-- [RFC](https://datatracker.ietf.org/doc/html/rfc4193)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/209.1.md b/doc/user/application_security/dast/checks/209.1.md
index e23477603e6c898b2dbe58a90bc48c36d5e9e5b3..2a77149394c7a77ce571f89b857fbdf76fc48f3d 100644
--- a/doc/user/application_security/dast/checks/209.1.md
+++ b/doc/user/application_security/dast/checks/209.1.md
@@ -1,43 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/209.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Generation of error message containing sensitive information
+This document was moved to [another location](../browser/checks/209.1.md).
 
-## Description
-
-The application was found to return error data such as stack traces. Depending on the data contained within the error message,
-this information could be used by an attacker to conduct further attacks. While stack traces are helpful during development
-and debugging, they should not be presented to users when an error occurs.
-
-## Remediation
-
-Applications should handle exception conditions internally and map known failure types to error codes that can be displayed
-to a user. These error codes should be customized to the application and returned along with the relevant HTTP error code.
-
-When an error occurs, the application identifies the error type or class, and displays a numerical value to the
-user. Requests should also be tracked so when a user is presented with an error code, it has a corresponding request ID.
-Support teams can then correlate the HTTP error, the customized error code, and the request ID in the log files to
-determine the root cause of the error without leaking details to the end user.
-
-Example of returning customized errors:
-
-```plaintext
-HTTP/1.1 500 Internal Server Error
-...
-Error [0004] Occurred, please contact support or re-try your request again shortly.
-Request ID [a4bc91def12]
-...
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 209.1 | false | 209 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/209.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/209.2.md b/doc/user/application_security/dast/checks/209.2.md
index c0aaee909dcc96e7d072c026b695b69eca82a60e..9843a26e067930a85b18c5a98cafbbdbd92ef544 100644
--- a/doc/user/application_security/dast/checks/209.2.md
+++ b/doc/user/application_security/dast/checks/209.2.md
@@ -1,43 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/209.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Generation of database error message containing sensitive information
+This document was moved to [another location](../browser/checks/209.2.md).
 
-## Description
-
-The application was found to return database error messages. Determining the type of database may assist attackers in exploiting
-SQL Injection attacks against the system. While debug messages are helpful during development and debugging, they should not be
-presented to users when an error occurs.
-
-## Remediation
-
-Applications should handle database error conditions internally and map known failure types to error codes that can be displayed
-to a user. These error codes should be customized to the application and returned along with the relevant HTTP error code.
-
-When an error occurs, the application identifies the error type or class, and displays a numerical value to the
-user. Requests should also be tracked so when a user is presented with an error code, it has a corresponding request ID.
-Support teams can then correlate the HTTP error, the customized error code, and the request ID in the log files to
-determine the root cause of the error without leaking details to the end user.
-
-Example of returning customized errors:
-
-```plaintext
-HTTP/1.1 500 Internal Server Error
-...
-Error [0004] Occurred, please contact support or re-try your request again shortly.
-Request ID [a4bc91def12]
-...
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 209.2 | false | 209 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/209.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/22.1.md b/doc/user/application_security/dast/checks/22.1.md
index c85f2da52d73154504dc9e6076dec13b2b22f443..9abdb1b407732943ff36387db1c2ad093173aa02 100644
--- a/doc/user/application_security/dast/checks/22.1.md
+++ b/doc/user/application_security/dast/checks/22.1.md
@@ -1,38 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/22.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Improper limitation of a pathname to a restricted directory (Path traversal)
+This document was moved to [another location](../browser/checks/22.1.md).
 
-## Description
-
-The vulnerability can be exploited by inserting a payload into a
-parameter on the URL endpoint which allows for reading arbitrary files.
-This could be used to read sensitive files, access other users data, or aid in
-exploitation to gain further system access.
-
-## Remediation
-
-User input should never be used in constructing paths or files for interacting
-with the filesystem. This includes filenames supplied by user uploads or downloads.
-
-If possible, consider hashing the filenames and reference the hashed filenames in
-a database or datastore instead of directly attempting to access filenames provided
-by users or other system components.
-
-In the rare cases that the application must work with filenames, use the language
-provided functionality to extract only the filename part of the supplied value.
-Never attempt to use the path or directory information that comes from user input.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 22.1 | false | 22 | Active | high |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/attacks/Path_Traversal)
-- [CWE](https://cwe.mitre.org/data/definitions/22.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/287.1.md b/doc/user/application_security/dast/checks/287.1.md
index 32500ca9493a7bc71662f43ded716f8162ce916e..6ec51ce8384f978865decf17b5c53ea92340482f 100644
--- a/doc/user/application_security/dast/checks/287.1.md
+++ b/doc/user/application_security/dast/checks/287.1.md
@@ -1,33 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/287.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Insecure authentication over HTTP (Basic Authentication)
+This document was moved to [another location](../browser/checks/287.1.md).
 
-## Description
-
-The target application was found to authenticate users using the Basic Authentication scheme over HTTP.
-Basic Authentication base64 encodes the username and password and sends it in the `Authentication` header.
-Attackers who are in between the communication path (or on the same local network) of the client and server
-could use packet sniffers to read and decode the username and password.
-
-## Remediation
-
-If possible, switch to a more robust method to authenticate users such as OAuth 2.0, or storing usernames
-and passwords in a data store protected by the Argon2id algorithm. If Basic Authentication must be used,
-ensure credentials are only transmitted over secure channels such as HTTPS/TLS.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 287.1 | false | 287 | Passive | Medium |
-
-## Links
-
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html)
-- [OAuth 2.0](https://oauth.net/2/)
-- [CWE-287](https://cwe.mitre.org/data/definitions/287.html)
-- [RFC](https://datatracker.ietf.org/doc/html/rfc7617)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/287.2.md b/doc/user/application_security/dast/checks/287.2.md
index 15bdfb146b8effabdececa88f8a8ff8aa69bb75d..fa91ccef044f036866b4d5cc2e51e9d58a303b44 100644
--- a/doc/user/application_security/dast/checks/287.2.md
+++ b/doc/user/application_security/dast/checks/287.2.md
@@ -1,35 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/287.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Insecure authentication over HTTP (Digest Authentication)
+This document was moved to [another location](../browser/checks/287.2.md).
 
-## Description
-
-The target application was found to authenticate users using the Digest Authentication scheme over HTTP.
-Digest Authentication uses an insecure hashing algorithm (MD5) to hash the username and password and sends
-it in the `Authentication` header. Attackers who are in between the communication path (or on the same
-local network) of the client and server could use packet sniffers to modify the server's response parameters
-to downgrade the security of the digest access authentication mode. Additionally, the server stores the
-hashed credentials, usually in a file called `.htpasswd`. Tools are readily available to crack these passwords.
-
-## Remediation
-
-If possible, switch to a more robust method to authenticate users such as OAuth 2.0, or storing usernames
-and passwords in a data store protected by the Argon2id algorithm. If Digest Authentication must be used,
-ensure credentials are only transmitted over secure channels such as HTTPS/TLS.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 287.2 | false | 287 | Passive | Low |
-
-## Links
-
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html)
-- [OAuth 2.0](https://oauth.net/2/)
-- [CWE-287](https://cwe.mitre.org/data/definitions/287.html)
-- [RFC](https://datatracker.ietf.org/doc/html/rfc2069)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/319.1.md b/doc/user/application_security/dast/checks/319.1.md
index a79592aa0ce8c63f24ec116523f991695fc5fd67..9007982be5fce6c77de0871bff9a937db540371a 100644
--- a/doc/user/application_security/dast/checks/319.1.md
+++ b/doc/user/application_security/dast/checks/319.1.md
@@ -1,37 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/319.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Mixed Content
+This document was moved to [another location](../browser/checks/319.1.md).
 
-## Description
-
-The target application was found to request resources over insecure transport protocols (HTTP). This is usually due to HTML
-elements which load resources using the `http://` scheme instead of `https://`. It should be noted that most modern browsers
-block these requests automatically so there is limited risk.
-
-Some parts of the application may not behave correctly since these files are not being properly loaded.
-
-## Remediation
-
-Ensure all HTML elements which load resources from a URL (JavaScript, stylesheets, images, video and other media) are set to
-use the `https://` scheme instead of `http://`. Alternatively, developers may use the `//` scheme, which will only load resources
-over the same protocol that the originating page was loaded.
-
-A browser visiting the website `https://example.com` with the HTML loading a file using
-`<script src="//example.com/cdn/bundle.js"></script>`, would ensure the `example.com/cdn/bundle.js` file was loaded over
-HTTPS.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 319.1 | true | 319 | Passive | Info |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/vulnerabilities/Insecure_Transport)
-- [CWE](https://cwe.mitre.org/data/definitions/319.html)
-- [MDN](https://developer.mozilla.org/en-US/docs/Web/Security/Mixed_content)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/352.1.md b/doc/user/application_security/dast/checks/352.1.md
index c149a83abad6f8d4b88c1c6542f75d2fc53b8c03..80c9afbe745dc55b4c45cf98e3437b7260315844 100644
--- a/doc/user/application_security/dast/checks/352.1.md
+++ b/doc/user/application_security/dast/checks/352.1.md
@@ -1,41 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/352.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Absence of anti-CSRF tokens
+This document was moved to [another location](../browser/checks/352.1.md).
 
-## Description
-
-The application failed to protect against Cross-Site Request Forgery (CSRF) by using
-secure application tokens or `SameSite` cookie directives.
-
-The vulnerability can be exploited by an attacker creating a link or form on a third
-party site and tricking an authenticated victim to access them.
-
-## Remediation
-
-Consider setting all session cookies to have the `SameSite=Strict` attribute. However,
-it should be noted that this may impact usability when sharing links across other mediums.
-It is recommended that a two cookie based approach is taken, as outlined in the
-[Top level navigations](https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-rfc6265bis-08#section-8.8.2) section
-of the RFC.
-
-If the application is using a common framework, there is a chance that Anti-CSRF protection
-is built in but needs to be enabled. Consult your application framework documentation for
-details.
-
-If neither of the above are applicable, it is **strongly** recommended that a third party library is used.
-Implementing a secure Anti-CSRF system is a significant investment and difficult to do correctly.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 352.1 | true | 352 | Passive | Medium |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/attacks/csrf)
-- [CWE](https://cwe.mitre.org/data/definitions/352.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/359.1.md b/doc/user/application_security/dast/checks/359.1.md
index dfb60c3a053b3bb19c51ad336fc3d8e0f577ddb5..7ad80173b99f57191858ab12f7a7a7949d6d7d86 100644
--- a/doc/user/application_security/dast/checks/359.1.md
+++ b/doc/user/application_security/dast/checks/359.1.md
@@ -1,34 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/359.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of Private Personal Information (PII) to an unauthorized actor (credit card)
+This document was moved to [another location](../browser/checks/359.1.md).
 
-## Description
-
-The target application was found to return credit card information in the response. Organizations
-found returning such information may be in violation of industry regulations and could face fines.
-
-## Remediation
-
-PII such as credit cards should never be directly returned to the user. The majority of the information should masked except
-the last few digits or characters of the identifier. For example, credit card numbers should
-only return the last four digits: `****-****-****-1234`. Ensure this masking is done on the server
-and only then send the masked data back to the client. Do not rely on client side JavaScript or other methods
-to mask these values as the data could still be intercepted or unmasked.
-
-Additionally, credit card information should never be stored un-encrypted in files or databases.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 359.1 | true | 359 | Passive | Medium |
-
-## Links
-
-- [OWASP Top 10 A3 2017 - Sensitive Data Exposure](https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure)
-- [CWE](https://cwe.mitre.org/data/definitions/359.html)
-- [PCI-DSS](https://www.pcisecuritystandards.org/pdfs/pci_fs_data_storage.pdf)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/359.2.md b/doc/user/application_security/dast/checks/359.2.md
index 6a2df607abe23426111348c32b0523f443cbafac..6b3db6ba47f73e96e438b726d8ba0b39bd1856f9 100644
--- a/doc/user/application_security/dast/checks/359.2.md
+++ b/doc/user/application_security/dast/checks/359.2.md
@@ -1,34 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/359.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of Private Personal Information (PII) to an unauthorized actor (United States social security number)
+This document was moved to [another location](../browser/checks/359.2.md).
 
-## Description
-
-The target application was found to return social security number (SSN) information in the response. Organizations
-found returning such information may be in violation of (United States) state or federal laws and may face stiff penalties.
-
-## Remediation
-
-PII such as social security numbers should never be directly returned to the user. The majority of the information
-should masked except the last few digits or characters of the identifier. For example, social security numbers
-only be displayed with the last four digits: `***-**-1234`. Ensure this masking is done on the server
-and only then send the masked data back to the client. Do not rely on client side JavaScript or other methods
-to mask these values as the data could still be intercepted or unmasked.
-
-Additionally, social security numbers should never be stored un-encrypted in files or databases.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 359.2 | true | 359 | Passive | Medium |
-
-## Links
-
-- [OWASP Top 10 A3 2017 - Sensitive Data Exposure](https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure)
-- [CWE](https://cwe.mitre.org/data/definitions/359.html)
-- [Privacy Act (CMPPA)](https://www.ssa.gov/dataexchange/privacyinfo.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/548.1.md b/doc/user/application_security/dast/checks/548.1.md
index e11ea08558212e6f5f28ca4f84a421e30b1c2357..8b6f8487bc2aa2e5dc35c284ea67b43fb8f1d506 100644
--- a/doc/user/application_security/dast/checks/548.1.md
+++ b/doc/user/application_security/dast/checks/548.1.md
@@ -1,45 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/548.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of information through directory listing
+This document was moved to [another location](../browser/checks/548.1.md).
 
-## Description
-
-The target web server is configured to list the contents of directories that do not contain an index file
-such as `index.html`. This could lead to accidental exposure of sensitive information, or give an attacker
-details on how filenames and directories are structured and stored.
-
-## Remediation
-
-Directory indexing should be disabled.
-
-Apache:
-For Apache based web sites, ensure all `<Directory>` definitions have `Options -Indexes` configured in the
-`apache2.conf` or `httpd.conf` configuration file.
-
-NGINX:
-For NGINX based websites, ensure all `location` definitions have the `autoindex off` directive set in the
-`nginx.conf` file.
-
-IIS:
-For IIS based websites version 7.0 and above you can use the `<directoryBrowse enabled="false" />` element
-in the `applicationHost.config` or `Web.config` files.
-
-For all other server types, Consult your product's documentation on how to disable directory
-indexing.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 548.1 | false | 548 | Passive | Low |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/548.html)
-- [Apache Options](https://httpd.apache.org/docs/2.4/mod/core.html#options)
-- [NGINX `autoindex`](https://nginx.org/en/docs/http/ngx_http_autoindex_module.html)
-- [IIS `directoryBrowse` element](https://learn.microsoft.com/en-us/iis/configuration/system.webserver/directorybrowse)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/598.1.md b/doc/user/application_security/dast/checks/598.1.md
index dfef8b791daca6b6327dc5c7389ea1b9860dc8d8..83345e641fbfa0a38c2bb9ad5b3972f7d4777959 100644
--- a/doc/user/application_security/dast/checks/598.1.md
+++ b/doc/user/application_security/dast/checks/598.1.md
@@ -1,31 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/598.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Use of GET request method with sensitive query strings (session ID)
+This document was moved to [another location](../browser/checks/598.1.md).
 
-## Description
-
-A session ID was identified in the request URL as well as a cookie value. Session
-IDs should not be sent in GET requests as they maybe captured by proxy systems, stored in
-browser history, or stored in log files. If an attacker were to get access to the session
-ID they would potentially be able to gain access to the target account.
-
-## Remediation
-
-As request headers are rarely logged or captured by third party systems, ensure session ID
-values are only sent in cookies (assigned via `Set-Cookie` response headers) and never sent
-in the request URL.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 598.1 | true | 598 | Passive | Medium |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/vulnerabilities/Information_exposure_through_query_strings_in_url)
-- [CWE](https://cwe.mitre.org/data/definitions/598.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/598.2.md b/doc/user/application_security/dast/checks/598.2.md
index bcee92687236cb4cd0afe19394f0748fbfafc3c2..cd42498897d892bebf55ab0ee75c7be189b54a18 100644
--- a/doc/user/application_security/dast/checks/598.2.md
+++ b/doc/user/application_security/dast/checks/598.2.md
@@ -1,30 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/598.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Use of GET request method with sensitive query strings (password)
+This document was moved to [another location](../browser/checks/598.2.md).
 
-## Description
-
-The user's password was identified in the request URL. Passwords should never be sent in GET
-requests as they maybe captured by proxy systems, stored in browser history, or stored in
-log files. If an attacker were to get access to these logs or logging systems, they would
-be able to gain access to the target account.
-
-## Remediation
-
-Passwords should never be sent in GET requests. When authenticating users or requesting users
-reset their passwords, always use `POST` requests to transmit sensitive data.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 598.2 | true | 598 | Passive | Medium |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/vulnerabilities/Information_exposure_through_query_strings_in_url)
-- [CWE](https://cwe.mitre.org/data/definitions/598.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/598.3.md b/doc/user/application_security/dast/checks/598.3.md
index 4cae92c17e2ca5ce0c774de2d9e58c92de54e784..1a2a36293dea0d4229d3102196ad2b17aaec81e8 100644
--- a/doc/user/application_security/dast/checks/598.3.md
+++ b/doc/user/application_security/dast/checks/598.3.md
@@ -1,31 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/598.3.md'
+remove_date: '2024-05-16'
 ---
 
-# Use of GET request method with sensitive query strings (Authorization header details)
+This document was moved to [another location](../browser/checks/598.3.md).
 
-## Description
-
-The authorization header value was identified in the request URL. These headers typically contain
-usernames and passwords or JWT tokens. These values should never be sent in GET requests as they
-maybe captured by proxy systems, stored in browser history, or stored in log files. If an attacker
-were to get access to these logs or logging systems, they would be able to gain access to the
-target account.
-
-## Remediation
-
-Authorization header details should never be sent in GET requests. When transmitting sensitive information
-such as JWT tokens, always use `POST` requests or headers to transmit the sensitive data.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 598.3 | true | 598 | Passive | Medium |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/vulnerabilities/Information_exposure_through_query_strings_in_url)
-- [CWE](https://cwe.mitre.org/data/definitions/598.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/601.1.md b/doc/user/application_security/dast/checks/601.1.md
index 8bd7cd7b8b0da683bdc2e55dbec3804b6906f4d5..941c554367b93e73863e5a1d9e3a54a1d001f485 100644
--- a/doc/user/application_security/dast/checks/601.1.md
+++ b/doc/user/application_security/dast/checks/601.1.md
@@ -1,34 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/601.1.md'
+remove_date: '2024-05-16'
 ---
 
-# URL redirection to untrusted site ('open redirect')
+This document was moved to [another location](../browser/checks/601.1.md).
 
-## Description
-
-This site was found to allow open redirects from user supplied input. Open redirects are commonly
-abused in phishing attacks where the original domain or URL looks like a legitimate link, but then
-redirects a user to a malicious site. An example would be
-`https://example.com/redirect?url=https://%62%61%64%2e%63%6f%6d%2f%66%61%6b%65%6c%6f%67%69%6e` which,
-when decoded turns into `bad.com/fakelogin`.
-
-## Remediation
-
-Never redirect a client based on user input found in a `GET` request. It is recommended that the list
-of target links to redirect a user to are contained server side, and retrieved using a numerical value
-as an index to return the link to be redirected to. For example, `/redirect?id=1` would cause the
-application to look up the `1` index and return a URL such as `https://example.com`. This URL would
-then be used to redirect the user, using the 301 response code and `Location` header.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 601.1 | true | 601 | Passive | Low |
-
-## Links
-
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
-- [CWE](https://cwe.mitre.org/data/definitions/601.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/611.1.md b/doc/user/application_security/dast/checks/611.1.md
index e9916cf507d53792255d26b9790e5350de7739f3..006bade265d8f29984a39f433678d2080c3aa674 100644
--- a/doc/user/application_security/dast/checks/611.1.md
+++ b/doc/user/application_security/dast/checks/611.1.md
@@ -1,31 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/611.1.md'
+remove_date: '2024-05-16'
 ---
 
-# External XML Entity Injection (XXE)
+This document was moved to [another location](../browser/checks/611.1.md).
 
-## Description
-
-It is possible to cause the application's XML parser to include external resources.
-This can include files or in some circumstances initiate requests to third party
-servers.
-
-## Remediation
-
-Consult the documentation for the XML Parser used by the target application for security
-guidelines and hardening steps. It is recommended that all XML parsers disable external
-entity resolution and XML `xinclude` features. Most XML parsers based on `libxml` can also be
-configured to disable network access.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 611.1 | false | 611 | Active | high |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing)
-- [CWE](https://cwe.mitre.org/data/definitions/611.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/614.1.md b/doc/user/application_security/dast/checks/614.1.md
index 983e3d16019ecfdbe7dc5f225c7ac4408a0bef90..4c7fde647c3e71cf756c30f4654b6d03923a84ba 100644
--- a/doc/user/application_security/dast/checks/614.1.md
+++ b/doc/user/application_security/dast/checks/614.1.md
@@ -1,40 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/614.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Sensitive cookie without Secure attribute
+This document was moved to [another location](../browser/checks/614.1.md).
 
-## Description
-
-The cookie was transmitted in a `Set-Cookie` response without the `Secure` attribute set.
-To prevent sensitive cookie values being accidentally transmitted over clear-text HTTP we
-recommended that cookies are declared with the `Secure` attribute.
-
-## Remediation
-
-Most web application frameworks allow configuring how cookies are sent to user agents. Consult your framework's
-documentation for more information on how to enable various security attributes when assigning cookies to clients.
-
-If the application is assigning cookies via writing to the response headers directly, ensure all responses include
-the `Secure` attribute. By enabling this protection, the application will no longer send sensitive cookies over
-HTTP.
-
-Example:
-
-```http
-Set-Cookie: {cookie_name}=<random secure value>; Secure
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 614.1 | false | 614 | Passive | Low |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/controls/SecureCookieAttribute)
-- [CWE](https://cwe.mitre.org/data/definitions/614.html)
-- [Mozilla MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#restrict_access_to_cookies)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/693.1.md b/doc/user/application_security/dast/checks/693.1.md
index 12cb72a5a9832bdf329c9158ac8a2d3d78dfbc0c..76cf6881ea87fc42fa32f6c54fa6e8d80020402f 100644
--- a/doc/user/application_security/dast/checks/693.1.md
+++ b/doc/user/application_security/dast/checks/693.1.md
@@ -1,36 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/693.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Missing X-Content-Type-Options: nosniff
+This document was moved to [another location](../browser/checks/693.1.md).
 
-## Description
-
-The `X-Content-Type-Options` header with the value `nosniff` ensures that user agents do not attempt to
-guess the format of the data being received. User Agents such as browsers, commonly attempt to guess
-what the resource type being requested is, through a process called MIME type sniffing.
-
-Without this header being sent, the browser may misinterpret the data, leading to MIME confusion attacks.
-If an attacker were able to upload files that are accessible by using a browser, they could upload files
-that could be interpreted as HTML and execute Cross-Site Scripting (XSS) attacks.
-
-## Remediation
-
-We recommend that the header and value of `X-Content-Type-Options: nosniff` be set server wide.
-This ensures any resources that are mistakenly missing a `Content-Type` value are not
-misinterpreted.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 693.1 | true | 693 | Passive | Low |
-
-## Links
-
-- [OWASP](https://owasp.org/www-project-secure-headers/#x-content-type-options)
-- [CWE](https://cwe.mitre.org/data/definitions/693.html)
-- [Mozilla Blog on MIME Confusion attacks](https://blog.mozilla.org/security/2016/08/26/mitigating-mime-confusion-attacks-in-firefox/)
-- [Mozilla MDN on X-Content-Type-Options](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/74.1.md b/doc/user/application_security/dast/checks/74.1.md
index 4093c9f9fd083f8aca9ca2ee2d7a75e649d73227..90565c01a486351d7fe48bdd3b8ace13b392a59e 100644
--- a/doc/user/application_security/dast/checks/74.1.md
+++ b/doc/user/application_security/dast/checks/74.1.md
@@ -1,31 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/74.1.md'
+remove_date: '2024-05-16'
 ---
 
-# XSLT Injection
+This document was moved to [another location](../browser/checks/74.1.md).
 
-## Description
-
-It is possible to supply an XSL template to a server-side XSLT processor. XSLT processors can
-be abused to read or write files, initiate outbound connections, and in some cases execute
-arbitrary code.
-
-## Remediation
-
-Applications should never accept user-supplied style sheets. XSLT processors are not built to
-handle potentially malicious stylesheet files. However, some processors do implement or offer
-security features which may be available. Consult the documentation for the XSLT processor
-used by the target application for security guidelines and hardening steps. It is recommended
-that all XML parsers and processors at the very least disable external entity resolution.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 74.1 | false | 74 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/74.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/78.1.md b/doc/user/application_security/dast/checks/78.1.md
index 177d7c00122446ff14a4d05674ea01484e371fd1..63347cad36c7683515a13d2c226a760e00728e10 100644
--- a/doc/user/application_security/dast/checks/78.1.md
+++ b/doc/user/application_security/dast/checks/78.1.md
@@ -1,44 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/78.1.md'
+remove_date: '2024-05-16'
 ---
 
-# OS Command Injection
+This document was moved to [another location](../browser/checks/78.1.md).
 
-## Description
-
-It is possible to execute arbitrary OS commands on the target application server.
-OS Command Injection is a critical vulnerability that can lead to a full system
-compromise.
-
-## Remediation
-
-User input should never be used in constructing commands or command arguments
-to functions which execute OS commands. This includes filenames supplied by
-user uploads or downloads.
-
-Ensure your application does not:
-
-- Use user-supplied information in the process name to execute.
-- Use user-supplied information in an OS command execution function which does
-  not escape shell meta-characters.
-- Use user-supplied information in arguments to OS commands.
-
-The application should have a hardcoded set of arguments that are to be passed
-to OS commands. If filenames are being passed to these functions, it is
-recommended that a hash of the filename be used instead, or some other unique
-identifier. It is strongly recommended that a native library that implements
-the same functionality be used instead of using OS system commands due to the
-risk of unknown attacks against third party commands.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 78.1 | false | 78 | Active | high |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/attacks/Command_Injection)
-- [CWE](https://cwe.mitre.org/data/definitions/78.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.1.md b/doc/user/application_security/dast/checks/798.1.md
index cf23655e8bbd9bb37d4398ea630c49de2480acc5..9cf13f7cd152e9605611b5a6f9323e4676bd09c0 100644
--- a/doc/user/application_security/dast/checks/798.1.md
+++ b/doc/user/application_security/dast/checks/798.1.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Adafruit API Key
+This document was moved to [another location](../browser/checks/798.1.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Adafruit API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.1 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.10.md b/doc/user/application_security/dast/checks/798.10.md
index 30aa9da4cfa9a2c30c64340e3b19cce57e3fc271..350e74125a6ffd5bc4dd3785c3b24b572657c68f 100644
--- a/doc/user/application_security/dast/checks/798.10.md
+++ b/doc/user/application_security/dast/checks/798.10.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.10.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Asana Client Secret
+This document was moved to [another location](../browser/checks/798.10.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Asana Client Secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.10 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.100.md b/doc/user/application_security/dast/checks/798.100.md
index 845cb6e4666e03b75264fdd2c52ded2c733504ec..16814097b590854b0c331b138345b55db9ea8728 100644
--- a/doc/user/application_security/dast/checks/798.100.md
+++ b/doc/user/application_security/dast/checks/798.100.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.100.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Sendbird Access Token
+This document was moved to [another location](../browser/checks/798.100.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Sendbird Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.100 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.101.md b/doc/user/application_security/dast/checks/798.101.md
index dc4ee135855593e7f146bc802ce8ed3652652185..ba0b370d47472b999f61a3d6db0167a57f6fbd97 100644
--- a/doc/user/application_security/dast/checks/798.101.md
+++ b/doc/user/application_security/dast/checks/798.101.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.101.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token SendGrid API token
+This document was moved to [another location](../browser/checks/798.101.md).
 
-## Description
-
-The response body contains content that matches the pattern of a SendGrid API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.101 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.102.md b/doc/user/application_security/dast/checks/798.102.md
index 5ba7f8fc48bf3f8740e5fa9ed214649d7dcdc80e..9b45e5ec83e6e1154f76435f6bc0b0591764ce51 100644
--- a/doc/user/application_security/dast/checks/798.102.md
+++ b/doc/user/application_security/dast/checks/798.102.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.102.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Sendinblue API token
+This document was moved to [another location](../browser/checks/798.102.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Sendinblue API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.102 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.103.md b/doc/user/application_security/dast/checks/798.103.md
index c483e3c61d060a9d916c9cac0e60a31192e06c37..bcdf9cf8bef39a6464ce5a5393b42f18a0f5e48f 100644
--- a/doc/user/application_security/dast/checks/798.103.md
+++ b/doc/user/application_security/dast/checks/798.103.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.103.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Sentry Access Token
+This document was moved to [another location](../browser/checks/798.103.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Sentry Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.103 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.104.md b/doc/user/application_security/dast/checks/798.104.md
index 1e129bbb7ec478d36acc495fbd752b6be3394fdf..df42236602d68ef8556a9d6183c141d7b8841993 100644
--- a/doc/user/application_security/dast/checks/798.104.md
+++ b/doc/user/application_security/dast/checks/798.104.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.104.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Shippo API token
+This document was moved to [another location](../browser/checks/798.104.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Shippo API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.104 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.105.md b/doc/user/application_security/dast/checks/798.105.md
index b821fe50686c37388e2b04216a7cc42f8131486b..aa23d0c4986ef04bdf4efcd7dd7c00683cd3e9aa 100644
--- a/doc/user/application_security/dast/checks/798.105.md
+++ b/doc/user/application_security/dast/checks/798.105.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.105.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Shopify access token
+This document was moved to [another location](../browser/checks/798.105.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Shopify access token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.105 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.106.md b/doc/user/application_security/dast/checks/798.106.md
index 1209bf391dcfbde8733241cdc15d96fcfd69b3b3..2703e4d4c4587b1e283602448402a82cef8060e7 100644
--- a/doc/user/application_security/dast/checks/798.106.md
+++ b/doc/user/application_security/dast/checks/798.106.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.106.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Shopify custom access token
+This document was moved to [another location](../browser/checks/798.106.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Shopify custom access token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.106 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.107.md b/doc/user/application_security/dast/checks/798.107.md
index 7fde093630ade26092e6271c768ab6bcf70daae1..cc26f848e3f7db9b9f4643aab6b8104fcf7e07fe 100644
--- a/doc/user/application_security/dast/checks/798.107.md
+++ b/doc/user/application_security/dast/checks/798.107.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.107.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Shopify private app access token
+This document was moved to [another location](../browser/checks/798.107.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Shopify private app access token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.107 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.108.md b/doc/user/application_security/dast/checks/798.108.md
index e0e00fedc851a5db511e421f8313d6a14b978c02..a676eaafde649c069473c6538892955493a3cfea 100644
--- a/doc/user/application_security/dast/checks/798.108.md
+++ b/doc/user/application_security/dast/checks/798.108.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.108.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Shopify shared secret
+This document was moved to [another location](../browser/checks/798.108.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Shopify shared secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.108 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.109.md b/doc/user/application_security/dast/checks/798.109.md
index 1924d41f1b961ac54b149cb8b231a7bcc9a58545..64c391c12c105c602b21abe00509be9fb06a1500 100644
--- a/doc/user/application_security/dast/checks/798.109.md
+++ b/doc/user/application_security/dast/checks/798.109.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.109.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Slack token
+This document was moved to [another location](../browser/checks/798.109.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Slack token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.109 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.11.md b/doc/user/application_security/dast/checks/798.11.md
index 884e031a6b47bb17d43b64bde7b8dd01880b867c..81932fedf6fab90a18ebb127ebb4046213c8d649 100644
--- a/doc/user/application_security/dast/checks/798.11.md
+++ b/doc/user/application_security/dast/checks/798.11.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.11.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Atlassian API token
+This document was moved to [another location](../browser/checks/798.11.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Atlassian API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.11 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.110.md b/doc/user/application_security/dast/checks/798.110.md
index 1d8fa783ab0c7f2e621d1c58f6cc933d9ebd4589..39e949c39e36075a8f95d63499d290b57020f165 100644
--- a/doc/user/application_security/dast/checks/798.110.md
+++ b/doc/user/application_security/dast/checks/798.110.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.110.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Slack Webhook
+This document was moved to [another location](../browser/checks/798.110.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Slack Webhook.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.110 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.111.md b/doc/user/application_security/dast/checks/798.111.md
index 65e327929c148587402b4cc4a3939c70ae19169e..527d038b741a0a93ee6b887a4345158f64331e40 100644
--- a/doc/user/application_security/dast/checks/798.111.md
+++ b/doc/user/application_security/dast/checks/798.111.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.111.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Stripe
+This document was moved to [another location](../browser/checks/798.111.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Stripe.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.111 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.112.md b/doc/user/application_security/dast/checks/798.112.md
index d8cb5ee2a14fedd1055c8456e8748073142c8b2e..df4bfa8732ad81b05b56b891eaad51b28d15ed8e 100644
--- a/doc/user/application_security/dast/checks/798.112.md
+++ b/doc/user/application_security/dast/checks/798.112.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.112.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Square Access Token
+This document was moved to [another location](../browser/checks/798.112.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Square Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.112 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.113.md b/doc/user/application_security/dast/checks/798.113.md
index 07a902db98892b55b3542d1f43d25c14edcf6bbc..d0affe2dad77c5906fd3b5d6ac3bb8d61399427e 100644
--- a/doc/user/application_security/dast/checks/798.113.md
+++ b/doc/user/application_security/dast/checks/798.113.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.113.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Squarespace Access Token
+This document was moved to [another location](../browser/checks/798.113.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Squarespace Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.113 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.114.md b/doc/user/application_security/dast/checks/798.114.md
index e01e0200944bcdfca270fdce297ed3a540d5be27..5d3db99ff7bd3d9573d1db9eb737061b7ba8cc66 100644
--- a/doc/user/application_security/dast/checks/798.114.md
+++ b/doc/user/application_security/dast/checks/798.114.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.114.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token SumoLogic Access ID
+This document was moved to [another location](../browser/checks/798.114.md).
 
-## Description
-
-The response body contains content that matches the pattern of a SumoLogic Access ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.114 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.115.md b/doc/user/application_security/dast/checks/798.115.md
index c32fca8b1f3ba7bbb958fa1f0d868e4f3e5f7827..b67765432d3f4190c5cbe2a204adeb99ef2102f1 100644
--- a/doc/user/application_security/dast/checks/798.115.md
+++ b/doc/user/application_security/dast/checks/798.115.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.115.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token SumoLogic Access Token
+This document was moved to [another location](../browser/checks/798.115.md).
 
-## Description
-
-The response body contains content that matches the pattern of a SumoLogic Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.115 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.116.md b/doc/user/application_security/dast/checks/798.116.md
index 70ecd597ad8fd23b43df0d770060e6e418e13bd5..0ed444f015441a796477da81bd1aae62f8135340 100644
--- a/doc/user/application_security/dast/checks/798.116.md
+++ b/doc/user/application_security/dast/checks/798.116.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.116.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Travis CI Access Token
+This document was moved to [another location](../browser/checks/798.116.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Travis CI Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.116 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.117.md b/doc/user/application_security/dast/checks/798.117.md
index ac145e33cb68df4766ed0846d58a41796107584c..8acce0a6f9b3e80fb519c28893cc321bf31081c9 100644
--- a/doc/user/application_security/dast/checks/798.117.md
+++ b/doc/user/application_security/dast/checks/798.117.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.117.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Twilio API Key
+This document was moved to [another location](../browser/checks/798.117.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Twilio API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.117 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.118.md b/doc/user/application_security/dast/checks/798.118.md
index be589cad76ac898fa5895cdae5ee8f4a656500c1..277ebc7a747aba7db4d02e257d8ddb8201d0b6ac 100644
--- a/doc/user/application_security/dast/checks/798.118.md
+++ b/doc/user/application_security/dast/checks/798.118.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.118.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Twitch API token
+This document was moved to [another location](../browser/checks/798.118.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Twitch API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.118 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.119.md b/doc/user/application_security/dast/checks/798.119.md
index 4da8a6d9edec6bbc401445d6617717c767118454..144a0c321fd932af0c446b1ba3e0fe0b643a2761 100644
--- a/doc/user/application_security/dast/checks/798.119.md
+++ b/doc/user/application_security/dast/checks/798.119.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.119.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Twitter API Key
+This document was moved to [another location](../browser/checks/798.119.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Twitter API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.119 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.12.md b/doc/user/application_security/dast/checks/798.12.md
index 59becd08c2b4c310140c910ca214878ca2922157..f27c7f0f3bcaa19c92779702d381de6cc8f4f68f 100644
--- a/doc/user/application_security/dast/checks/798.12.md
+++ b/doc/user/application_security/dast/checks/798.12.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.12.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token AWS
+This document was moved to [another location](../browser/checks/798.12.md).
 
-## Description
-
-The response body contains content that matches the pattern of a AWS.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.12 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.120.md b/doc/user/application_security/dast/checks/798.120.md
index 9af5596655c9ee7e17ceb3b75f153c0c5c1da8d1..7b1b8dc253bc434033b6ae9e722813a8164f016b 100644
--- a/doc/user/application_security/dast/checks/798.120.md
+++ b/doc/user/application_security/dast/checks/798.120.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.120.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Twitter API Secret
+This document was moved to [another location](../browser/checks/798.120.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Twitter API Secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.120 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.121.md b/doc/user/application_security/dast/checks/798.121.md
index 7b621e59f14027de53fa1c960a62b144211ed147..88fcc24a8ed9da902ebb9e7d513bc741726ac6b9 100644
--- a/doc/user/application_security/dast/checks/798.121.md
+++ b/doc/user/application_security/dast/checks/798.121.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.121.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Twitter Access Token
+This document was moved to [another location](../browser/checks/798.121.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Twitter Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.121 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.122.md b/doc/user/application_security/dast/checks/798.122.md
index 7bc1544a7814ac018bdeb69bf2838d0712d29af5..7636d05bb4b5e652d7049936aec22d8b8e9fe70f 100644
--- a/doc/user/application_security/dast/checks/798.122.md
+++ b/doc/user/application_security/dast/checks/798.122.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.122.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Twitter Access Secret
+This document was moved to [another location](../browser/checks/798.122.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Twitter Access Secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.122 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.123.md b/doc/user/application_security/dast/checks/798.123.md
index 771a9b4da6e48a852b363c90ec4057f0b688e46c..cd5363ef0afe6ffdebe64768889d8ff57d47ca54 100644
--- a/doc/user/application_security/dast/checks/798.123.md
+++ b/doc/user/application_security/dast/checks/798.123.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.123.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Twitter Bearer Token
+This document was moved to [another location](../browser/checks/798.123.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Twitter Bearer Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.123 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.124.md b/doc/user/application_security/dast/checks/798.124.md
index 1335b1d2295338d31d0097aac7f16cdb3e90783c..fccb910d1b5dce5e226fb83d3342d7c042732505 100644
--- a/doc/user/application_security/dast/checks/798.124.md
+++ b/doc/user/application_security/dast/checks/798.124.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.124.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Typeform API token
+This document was moved to [another location](../browser/checks/798.124.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Typeform API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.124 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.125.md b/doc/user/application_security/dast/checks/798.125.md
index 9ff59f3b09bf298930cbaa131e4c26cb32ddf2fb..0eef9ab17be73eba8cf51ca233b6fc181d8433b9 100644
--- a/doc/user/application_security/dast/checks/798.125.md
+++ b/doc/user/application_security/dast/checks/798.125.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.125.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Yandex API Key
+This document was moved to [another location](../browser/checks/798.125.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Yandex API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.125 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.126.md b/doc/user/application_security/dast/checks/798.126.md
index f8bfdb98502170613d15c587bdd90e8eff27012a..65cb38b5eecee7ef16b2cfb69fe1c733b4ed2b6d 100644
--- a/doc/user/application_security/dast/checks/798.126.md
+++ b/doc/user/application_security/dast/checks/798.126.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.126.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Yandex AWS Access Token
+This document was moved to [another location](../browser/checks/798.126.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Yandex AWS Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.126 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.127.md b/doc/user/application_security/dast/checks/798.127.md
index 982c5eade9e97136fa46056a0e783409b4faf5db..6af48a843f97dc1b355845333bb4b7de8ffd30c6 100644
--- a/doc/user/application_security/dast/checks/798.127.md
+++ b/doc/user/application_security/dast/checks/798.127.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.127.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Yandex Access Token
+This document was moved to [another location](../browser/checks/798.127.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Yandex Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.127 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.128.md b/doc/user/application_security/dast/checks/798.128.md
index 39788d227a08ed7365100ca6bffcc75202e73b8d..a3f848925abe1ca863e5bfa216f6bdf5702968a4 100644
--- a/doc/user/application_security/dast/checks/798.128.md
+++ b/doc/user/application_security/dast/checks/798.128.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.128.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Zendesk Secret Key
+This document was moved to [another location](../browser/checks/798.128.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Zendesk Secret Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.128 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.13.md b/doc/user/application_security/dast/checks/798.13.md
index a68f851fda6324bfb2bc634b1fdd3950facf1ab8..8df066e64938c8a3cb5ddb3125231dc89c4e3384 100644
--- a/doc/user/application_security/dast/checks/798.13.md
+++ b/doc/user/application_security/dast/checks/798.13.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.13.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Bitbucket Client ID
+This document was moved to [another location](../browser/checks/798.13.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Bitbucket Client ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.13 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.14.md b/doc/user/application_security/dast/checks/798.14.md
index ce52326fcedef4d20b06f75cd9d293a8723556a6..2a8458da9cc60988022fbcefefc3a3102dd24fbd 100644
--- a/doc/user/application_security/dast/checks/798.14.md
+++ b/doc/user/application_security/dast/checks/798.14.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.14.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Bitbucket Client Secret
+This document was moved to [another location](../browser/checks/798.14.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Bitbucket Client Secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.14 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.15.md b/doc/user/application_security/dast/checks/798.15.md
index c31d5fd01aa8599c7b262ebf28d18b0fc712fb8f..6c4f94f9a15d22e124ab68a99ff7ea5918ed5469 100644
--- a/doc/user/application_security/dast/checks/798.15.md
+++ b/doc/user/application_security/dast/checks/798.15.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.15.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Bittrex Access Key
+This document was moved to [another location](../browser/checks/798.15.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Bittrex Access Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.15 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.16.md b/doc/user/application_security/dast/checks/798.16.md
index c4f18918d786fddab0e169ce42571df1db5ac98c..bd37cbd165be0346f6122094d78e1779c010ee69 100644
--- a/doc/user/application_security/dast/checks/798.16.md
+++ b/doc/user/application_security/dast/checks/798.16.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.16.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Bittrex Secret Key
+This document was moved to [another location](../browser/checks/798.16.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Bittrex Secret Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.16 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.17.md b/doc/user/application_security/dast/checks/798.17.md
index 67c3ee7ddd98f6a7627a1b307003078f59d340a0..9b4ba8ec4743b487a21e9a9623c4251d7ded66ab 100644
--- a/doc/user/application_security/dast/checks/798.17.md
+++ b/doc/user/application_security/dast/checks/798.17.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.17.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Beamer API token
+This document was moved to [another location](../browser/checks/798.17.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Beamer API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.17 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.18.md b/doc/user/application_security/dast/checks/798.18.md
index 81a47050d57ee922a74c767f314ae1c89e990749..e8113b02aff45c88d0e1aa019c4694979344db34 100644
--- a/doc/user/application_security/dast/checks/798.18.md
+++ b/doc/user/application_security/dast/checks/798.18.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.18.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Codecov Access Token
+This document was moved to [another location](../browser/checks/798.18.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Codecov Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.18 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.19.md b/doc/user/application_security/dast/checks/798.19.md
index b18a9d0e40c40e8dea02562a10cccdb8d5e9faf2..11bc35d5c3b5c526e31d3ea5b4aa8f8f11ab0019 100644
--- a/doc/user/application_security/dast/checks/798.19.md
+++ b/doc/user/application_security/dast/checks/798.19.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.19.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Coinbase Access Token
+This document was moved to [another location](../browser/checks/798.19.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Coinbase Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.19 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.2.md b/doc/user/application_security/dast/checks/798.2.md
index 42a7b5ae932b1883d1386601ec9de31923d44547..53df172788ff08f37452c544bbdb4013f6d015d3 100644
--- a/doc/user/application_security/dast/checks/798.2.md
+++ b/doc/user/application_security/dast/checks/798.2.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Adobe Client ID (OAuth Web)
+This document was moved to [another location](../browser/checks/798.2.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Adobe Client ID (OAuth Web).
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.2 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.20.md b/doc/user/application_security/dast/checks/798.20.md
index 987c1d5d34725279d8c0f7fef4eca25bc44f2990..67d074f918d694e10cb53efcddde9cffa61bc2e1 100644
--- a/doc/user/application_security/dast/checks/798.20.md
+++ b/doc/user/application_security/dast/checks/798.20.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.20.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Clojars API token
+This document was moved to [another location](../browser/checks/798.20.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Clojars API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.20 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.21.md b/doc/user/application_security/dast/checks/798.21.md
index cd81e02b3b4277f089068339eed1cbb303788b28..ae595d9e88dfeb3479b6c7acbda354a6a138ac06 100644
--- a/doc/user/application_security/dast/checks/798.21.md
+++ b/doc/user/application_security/dast/checks/798.21.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.21.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Confluent Access Token
+This document was moved to [another location](../browser/checks/798.21.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Confluent Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.21 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.22.md b/doc/user/application_security/dast/checks/798.22.md
index 735b48c257a10acf9018cb85d25e77e2b2dc0627..50b7b7232455d0ee6a7dec91135ac22b1ac2585f 100644
--- a/doc/user/application_security/dast/checks/798.22.md
+++ b/doc/user/application_security/dast/checks/798.22.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.22.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Confluent Secret Key
+This document was moved to [another location](../browser/checks/798.22.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Confluent Secret Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.22 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.23.md b/doc/user/application_security/dast/checks/798.23.md
index 8a7f3075ab44d4c1eadc59703c26a578835f4ca7..d987e8916acfe8ba5147e10fd21227844cc49100 100644
--- a/doc/user/application_security/dast/checks/798.23.md
+++ b/doc/user/application_security/dast/checks/798.23.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.23.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Contentful delivery API token
+This document was moved to [another location](../browser/checks/798.23.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Contentful delivery API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.23 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.24.md b/doc/user/application_security/dast/checks/798.24.md
index 61a5812c5ce350a9125262cee0dfa5694c3fd9a7..4c9dbe6105511ad814371a014023c93bcb76e18d 100644
--- a/doc/user/application_security/dast/checks/798.24.md
+++ b/doc/user/application_security/dast/checks/798.24.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.24.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Databricks API token
+This document was moved to [another location](../browser/checks/798.24.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Databricks API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.24 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.25.md b/doc/user/application_security/dast/checks/798.25.md
index 6a7bb14bbf5942667e3608299ca96ac636984523..6614bafc87ec5ce1f46f172972d3a5567fe58bcb 100644
--- a/doc/user/application_security/dast/checks/798.25.md
+++ b/doc/user/application_security/dast/checks/798.25.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.25.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Datadog Access Token
+This document was moved to [another location](../browser/checks/798.25.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Datadog Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.25 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.26.md b/doc/user/application_security/dast/checks/798.26.md
index 447716e15534b1ffb40ca42d4216eda39c66307e..e14c6d27ae15b84fd53a7d1b18fd4b203e2fc7f3 100644
--- a/doc/user/application_security/dast/checks/798.26.md
+++ b/doc/user/application_security/dast/checks/798.26.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.26.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Discord API key
+This document was moved to [another location](../browser/checks/798.26.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Discord API key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.26 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.27.md b/doc/user/application_security/dast/checks/798.27.md
index c9cc3a84fc628130cfc4abbd2ab45124e5580fb3..580379fd6e4ef47f5234ecf0b9ee8d74034d1c7f 100644
--- a/doc/user/application_security/dast/checks/798.27.md
+++ b/doc/user/application_security/dast/checks/798.27.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.27.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Discord client ID
+This document was moved to [another location](../browser/checks/798.27.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Discord client ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.27 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.28.md b/doc/user/application_security/dast/checks/798.28.md
index 57640c4cddba8f74929cc3a5db7eddae4dc41057..30c9903ddcb09025ace10430a288c8216c4968cc 100644
--- a/doc/user/application_security/dast/checks/798.28.md
+++ b/doc/user/application_security/dast/checks/798.28.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.28.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Discord client secret
+This document was moved to [another location](../browser/checks/798.28.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Discord client secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.28 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.29.md b/doc/user/application_security/dast/checks/798.29.md
index 061e45239f4ef5cac0706957c9482e240ac3fd05..f8eddd559b7d15fe9879e5b7de08bf59ddcbbe2a 100644
--- a/doc/user/application_security/dast/checks/798.29.md
+++ b/doc/user/application_security/dast/checks/798.29.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.29.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Doppler API token
+This document was moved to [another location](../browser/checks/798.29.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Doppler API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.29 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.3.md b/doc/user/application_security/dast/checks/798.3.md
index 0b00b4ed4227270eee20172788b4ef7330229cad..7534c666faf413790aecfcca44ed7e0712d56874 100644
--- a/doc/user/application_security/dast/checks/798.3.md
+++ b/doc/user/application_security/dast/checks/798.3.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.3.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Adobe Client Secret
+This document was moved to [another location](../browser/checks/798.3.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Adobe Client Secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.3 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.30.md b/doc/user/application_security/dast/checks/798.30.md
index 940f4fddf2ebea040393a8b90f829e3ae827f685..2d0fdd3e65052c2404078d3b308dcb43d5651140 100644
--- a/doc/user/application_security/dast/checks/798.30.md
+++ b/doc/user/application_security/dast/checks/798.30.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.30.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Dropbox API secret
+This document was moved to [another location](../browser/checks/798.30.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Dropbox API secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.30 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.31.md b/doc/user/application_security/dast/checks/798.31.md
index 35da215ca961493fcac6c134d5ccfdd8dd5f0fcb..f78f9c03cf76ce7b639cca731ef60d7483a30874 100644
--- a/doc/user/application_security/dast/checks/798.31.md
+++ b/doc/user/application_security/dast/checks/798.31.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.31.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Dropbox long lived API token
+This document was moved to [another location](../browser/checks/798.31.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Dropbox long lived API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.31 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.32.md b/doc/user/application_security/dast/checks/798.32.md
index 7fb99704cc54c9c585443ac33d1ed92890945eed..3632359ed1a395267a1c8054ef4315e0dd93ab36 100644
--- a/doc/user/application_security/dast/checks/798.32.md
+++ b/doc/user/application_security/dast/checks/798.32.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.32.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Dropbox short lived API token
+This document was moved to [another location](../browser/checks/798.32.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Dropbox short lived API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.32 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.33.md b/doc/user/application_security/dast/checks/798.33.md
index 0306521b9067fc6fa68df9fdaf2471910df39968..7458d1eb234a5ecd07219d2a4cce21f8badd5bf6 100644
--- a/doc/user/application_security/dast/checks/798.33.md
+++ b/doc/user/application_security/dast/checks/798.33.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.33.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Drone CI Access Token
+This document was moved to [another location](../browser/checks/798.33.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Drone CI Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.33 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.34.md b/doc/user/application_security/dast/checks/798.34.md
index 31f45b9f8dee3380401819d4c094fb05c985d296..b60ca3188f927f8f6aeedcc0f29fbce58b759377 100644
--- a/doc/user/application_security/dast/checks/798.34.md
+++ b/doc/user/application_security/dast/checks/798.34.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.34.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Duffel API token
+This document was moved to [another location](../browser/checks/798.34.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Duffel API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.34 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.35.md b/doc/user/application_security/dast/checks/798.35.md
index 1921de9b01578e4aa42203be554d0068d7815615..c55d238a887f0775c5179dd770c34fee9d449681 100644
--- a/doc/user/application_security/dast/checks/798.35.md
+++ b/doc/user/application_security/dast/checks/798.35.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.35.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Dynatrace API token
+This document was moved to [another location](../browser/checks/798.35.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Dynatrace API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.35 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.36.md b/doc/user/application_security/dast/checks/798.36.md
index 4660aebe53772fadd5be2b6883b48aa569311fa3..9ecf9de66764e7711aed4f5e0312993ddbab1541 100644
--- a/doc/user/application_security/dast/checks/798.36.md
+++ b/doc/user/application_security/dast/checks/798.36.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.36.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token EasyPost API token
+This document was moved to [another location](../browser/checks/798.36.md).
 
-## Description
-
-The response body contains content that matches the pattern of a EasyPost API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.36 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.37.md b/doc/user/application_security/dast/checks/798.37.md
index 3c78666147925db7a302c0a2a49577771c7e3e5b..12baf70de227dc3ea1e3e059177185c2264998fe 100644
--- a/doc/user/application_security/dast/checks/798.37.md
+++ b/doc/user/application_security/dast/checks/798.37.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.37.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token EasyPost test API token
+This document was moved to [another location](../browser/checks/798.37.md).
 
-## Description
-
-The response body contains content that matches the pattern of a EasyPost test API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.37 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.38.md b/doc/user/application_security/dast/checks/798.38.md
index 1274b0251ebbfb26c2d70c7458e6eadcddaa5762..167f2fd04e0c1b46eeab015b4c60f46753da23b4 100644
--- a/doc/user/application_security/dast/checks/798.38.md
+++ b/doc/user/application_security/dast/checks/798.38.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.38.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Etsy Access Token
+This document was moved to [another location](../browser/checks/798.38.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Etsy Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.38 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.39.md b/doc/user/application_security/dast/checks/798.39.md
index 6a00de081a6cc12cc416dcd554d2d1dc22746a93..35c1c9899ddfee9bc72bc3cc11a41cce6d698247 100644
--- a/doc/user/application_security/dast/checks/798.39.md
+++ b/doc/user/application_security/dast/checks/798.39.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.39.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Facebook
+This document was moved to [another location](../browser/checks/798.39.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Facebook.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.39 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.4.md b/doc/user/application_security/dast/checks/798.4.md
index 687327113c91b21e12037a77b249e2e33b98361a..b1c936aa8952167169953230d672e1322baf2667 100644
--- a/doc/user/application_security/dast/checks/798.4.md
+++ b/doc/user/application_security/dast/checks/798.4.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.4.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Age secret key
+This document was moved to [another location](../browser/checks/798.4.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Age secret key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.4 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.40.md b/doc/user/application_security/dast/checks/798.40.md
index 3cf14dd4a14fee34647ba4447f0cc22889963574..cfc144096d26ad693cca577619d2a74b157b6d81 100644
--- a/doc/user/application_security/dast/checks/798.40.md
+++ b/doc/user/application_security/dast/checks/798.40.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.40.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Fastly API key
+This document was moved to [another location](../browser/checks/798.40.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Fastly API key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.40 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.41.md b/doc/user/application_security/dast/checks/798.41.md
index 95e2aaa67ebe56eccfe5cac1e2eded7fbb155d8a..d55144996125f034d436c71460a8e1c5e008f4c1 100644
--- a/doc/user/application_security/dast/checks/798.41.md
+++ b/doc/user/application_security/dast/checks/798.41.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.41.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Finicity Client Secret
+This document was moved to [another location](../browser/checks/798.41.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Finicity Client Secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.41 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.42.md b/doc/user/application_security/dast/checks/798.42.md
index e2eedb3e9837b54d62d61e33026a5aa98e3aa4fe..ea26af7c914e16e4dd438317dec117574320f5e4 100644
--- a/doc/user/application_security/dast/checks/798.42.md
+++ b/doc/user/application_security/dast/checks/798.42.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.42.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Finicity API token
+This document was moved to [another location](../browser/checks/798.42.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Finicity API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.42 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.43.md b/doc/user/application_security/dast/checks/798.43.md
index 99f4c7dd92261a11234a7f5455281d80073d4fba..83c3e7c80a795e0cef4ab5d12ecf666d014c52be 100644
--- a/doc/user/application_security/dast/checks/798.43.md
+++ b/doc/user/application_security/dast/checks/798.43.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.43.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Flickr Access Token
+This document was moved to [another location](../browser/checks/798.43.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Flickr Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.43 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.44.md b/doc/user/application_security/dast/checks/798.44.md
index 9b13005f49c71c61b809c52d9cabbf54fac01421..f81ed378ab08c80c3fa219d0e285fe23e3a2387e 100644
--- a/doc/user/application_security/dast/checks/798.44.md
+++ b/doc/user/application_security/dast/checks/798.44.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.44.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Finnhub Access Token
+This document was moved to [another location](../browser/checks/798.44.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Finnhub Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.44 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.46.md b/doc/user/application_security/dast/checks/798.46.md
index 9697056af49f71af5ffe79c2068f5b0216c65c0d..0889d24963aba09f764fa776f1f344f464bb9029 100644
--- a/doc/user/application_security/dast/checks/798.46.md
+++ b/doc/user/application_security/dast/checks/798.46.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.46.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Flutterwave Secret Key
+This document was moved to [another location](../browser/checks/798.46.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Flutterwave Secret Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.46 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.47.md b/doc/user/application_security/dast/checks/798.47.md
index c257dc9bf11cc6b863438caa889cd2793ff80447..f2a5b42142ca3fd0cf13028b793f1243ba5e5486 100644
--- a/doc/user/application_security/dast/checks/798.47.md
+++ b/doc/user/application_security/dast/checks/798.47.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.47.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Flutterwave Encryption Key
+This document was moved to [another location](../browser/checks/798.47.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Flutterwave Encryption Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.47 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.48.md b/doc/user/application_security/dast/checks/798.48.md
index ed7d6f41db495be983cc42603bbce86c9c5682ce..492f0246f923285ef6721b4a582f7a92b40fdbd3 100644
--- a/doc/user/application_security/dast/checks/798.48.md
+++ b/doc/user/application_security/dast/checks/798.48.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.48.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Frame.io API token
+This document was moved to [another location](../browser/checks/798.48.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Frame.io API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.48 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.49.md b/doc/user/application_security/dast/checks/798.49.md
index 5f3eb52d5236631d167cfddbe3f7c9d378521e65..b1ec2e3794fb0fea972dcf2b5f4a95bdf1683638 100644
--- a/doc/user/application_security/dast/checks/798.49.md
+++ b/doc/user/application_security/dast/checks/798.49.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.49.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token FreshBooks Access Token
+This document was moved to [another location](../browser/checks/798.49.md).
 
-## Description
-
-The response body contains content that matches the pattern of a FreshBooks Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.49 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.5.md b/doc/user/application_security/dast/checks/798.5.md
index 4240b522bb1fb52dbd2f308670000a7afb22b262..2bf1b458e1057cbcab619e98bff4de2f0ee445bd 100644
--- a/doc/user/application_security/dast/checks/798.5.md
+++ b/doc/user/application_security/dast/checks/798.5.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.5.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Airtable API Key
+This document was moved to [another location](../browser/checks/798.5.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Airtable API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.5 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.50.md b/doc/user/application_security/dast/checks/798.50.md
index eb04b11f23f42006fb9965fb409c247f77f80707..0ebf7feb9d2267ccc854dc0da90f74e13c044268 100644
--- a/doc/user/application_security/dast/checks/798.50.md
+++ b/doc/user/application_security/dast/checks/798.50.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.50.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token GoCardless API token
+This document was moved to [another location](../browser/checks/798.50.md).
 
-## Description
-
-The response body contains content that matches the pattern of a GoCardless API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.50 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.52.md b/doc/user/application_security/dast/checks/798.52.md
index b5a8ac7ac82d74d8997c692c39e2e5ad9e83e6c2..cbb707bf4534ec5ce5a9b21f3a1c42080b8d8da3 100644
--- a/doc/user/application_security/dast/checks/798.52.md
+++ b/doc/user/application_security/dast/checks/798.52.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.52.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token GitHub Personal Access Token
+This document was moved to [another location](../browser/checks/798.52.md).
 
-## Description
-
-The response body contains content that matches the pattern of a GitHub Personal Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.52 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.53.md b/doc/user/application_security/dast/checks/798.53.md
index 37e19a96315aa9d505706cae9705fbf76d478068..d1aefb729e41f150bb1b8df900c1c8bb31eac3f4 100644
--- a/doc/user/application_security/dast/checks/798.53.md
+++ b/doc/user/application_security/dast/checks/798.53.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.53.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token GitHub OAuth Access Token
+This document was moved to [another location](../browser/checks/798.53.md).
 
-## Description
-
-The response body contains content that matches the pattern of a GitHub OAuth Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.53 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.54.md b/doc/user/application_security/dast/checks/798.54.md
index ba332ca1bd5efb7436a6b4feb1fa0bb15e2a62cc..9bccc5629d9c85ed1151f421dabf5b7e441c34c1 100644
--- a/doc/user/application_security/dast/checks/798.54.md
+++ b/doc/user/application_security/dast/checks/798.54.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.54.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token GitHub App Token
+This document was moved to [another location](../browser/checks/798.54.md).
 
-## Description
-
-The response body contains content that matches the pattern of a GitHub App Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.54 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.55.md b/doc/user/application_security/dast/checks/798.55.md
index c12f5b719ba35d83e08c1ecff6cd7766d64f7a5a..ca794de3bac3afcde17596fdc5b50bd24abd80eb 100644
--- a/doc/user/application_security/dast/checks/798.55.md
+++ b/doc/user/application_security/dast/checks/798.55.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.55.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token GitHub Refresh Token
+This document was moved to [another location](../browser/checks/798.55.md).
 
-## Description
-
-The response body contains content that matches the pattern of a GitHub Refresh Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.55 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.56.md b/doc/user/application_security/dast/checks/798.56.md
index 787bc9475619b54ab713c1e83e32e82899d4d28a..a53662c3562fcb5b0c3436ad3d15fd80df77680e 100644
--- a/doc/user/application_security/dast/checks/798.56.md
+++ b/doc/user/application_security/dast/checks/798.56.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.56.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token GitLab Personal Access Token
+This document was moved to [another location](../browser/checks/798.56.md).
 
-## Description
-
-The response body contains content that matches the pattern of a GitLab Personal Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.56 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.57.md b/doc/user/application_security/dast/checks/798.57.md
index 2fade7e2ec3eafdded0b2f7a41bb50d35519b212..29db9933dedcbbac6d706f22a494458298e8391b 100644
--- a/doc/user/application_security/dast/checks/798.57.md
+++ b/doc/user/application_security/dast/checks/798.57.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.57.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Gitter Access Token
+This document was moved to [another location](../browser/checks/798.57.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Gitter Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.57 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.58.md b/doc/user/application_security/dast/checks/798.58.md
index 50cc509b7da2ed59d4d7f3623023ada8dcfbee38..3e1374021c154c054590a1c3f05bf735ce5f1f7c 100644
--- a/doc/user/application_security/dast/checks/798.58.md
+++ b/doc/user/application_security/dast/checks/798.58.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.58.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token HashiCorp Terraform user/org API token
+This document was moved to [another location](../browser/checks/798.58.md).
 
-## Description
-
-The response body contains content that matches the pattern of a HashiCorp Terraform user/org API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.58 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.59.md b/doc/user/application_security/dast/checks/798.59.md
index 284f8a0df82812016d5491e2123f9e70669024d3..aa364bf960bb32ad06cf0b04156f05014a0c0e60 100644
--- a/doc/user/application_security/dast/checks/798.59.md
+++ b/doc/user/application_security/dast/checks/798.59.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.59.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Heroku API Key
+This document was moved to [another location](../browser/checks/798.59.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Heroku API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.59 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.6.md b/doc/user/application_security/dast/checks/798.6.md
index 79caf91addb8491ef72477cc9cd8e19b657a0777..9d4aead2b38a1c3aa74d649de1da41855198b343 100644
--- a/doc/user/application_security/dast/checks/798.6.md
+++ b/doc/user/application_security/dast/checks/798.6.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.6.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Algolia API Key
+This document was moved to [another location](../browser/checks/798.6.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Algolia API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.6 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.60.md b/doc/user/application_security/dast/checks/798.60.md
index ba9a31ac22e81a00a27b7f9c91f9c5bb883898fc..f009dc1416f391010d1783ff9ad68f20567f4e64 100644
--- a/doc/user/application_security/dast/checks/798.60.md
+++ b/doc/user/application_security/dast/checks/798.60.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.60.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token HubSpot API Token
+This document was moved to [another location](../browser/checks/798.60.md).
 
-## Description
-
-The response body contains content that matches the pattern of a HubSpot API Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.60 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.61.md b/doc/user/application_security/dast/checks/798.61.md
index d7287e66640706f5053d0beeafce7ab0e49e1ff8..8270e38d2e89368e787bd2c92b3df5b4a72beef9 100644
--- a/doc/user/application_security/dast/checks/798.61.md
+++ b/doc/user/application_security/dast/checks/798.61.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.61.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Intercom API Token
+This document was moved to [another location](../browser/checks/798.61.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Intercom API Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.61 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.62.md b/doc/user/application_security/dast/checks/798.62.md
index 33ae895bd4184eeeba66595fd22156a544aa0037..9f0db37d461a115f9f501db33f5693f2a6f5f6eb 100644
--- a/doc/user/application_security/dast/checks/798.62.md
+++ b/doc/user/application_security/dast/checks/798.62.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.62.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Kraken Access Token
+This document was moved to [another location](../browser/checks/798.62.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Kraken Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.62 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.63.md b/doc/user/application_security/dast/checks/798.63.md
index 8719cdc3e2ba5e80a60a2d59e8530909c14a1530..d3403e333a63c911013a63a8108a5b1cf02d9ab3 100644
--- a/doc/user/application_security/dast/checks/798.63.md
+++ b/doc/user/application_security/dast/checks/798.63.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.63.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Kucoin Access Token
+This document was moved to [another location](../browser/checks/798.63.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Kucoin Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.63 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.64.md b/doc/user/application_security/dast/checks/798.64.md
index 97c2f7e38bcb0f76b6ad9fa984e058fa34a6137c..9e0a2d0e399e159a8421995355bd32ae5beaf230 100644
--- a/doc/user/application_security/dast/checks/798.64.md
+++ b/doc/user/application_security/dast/checks/798.64.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.64.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Kucoin Secret Key
+This document was moved to [another location](../browser/checks/798.64.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Kucoin Secret Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.64 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.65.md b/doc/user/application_security/dast/checks/798.65.md
index aace3be2df7ad8c3adbc8350677a207f528ea2b1..e64220d3786b9f33eea9c4439d55f2c6a6414b2a 100644
--- a/doc/user/application_security/dast/checks/798.65.md
+++ b/doc/user/application_security/dast/checks/798.65.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.65.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token LaunchDarkly Access Token
+This document was moved to [another location](../browser/checks/798.65.md).
 
-## Description
-
-The response body contains content that matches the pattern of a LaunchDarkly Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.65 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.66.md b/doc/user/application_security/dast/checks/798.66.md
index 4bbdbf181c8fa5635b2d830d3f386e206029a729..217fa5c279b23c0a94cb02d6e6a6cfae84a793e9 100644
--- a/doc/user/application_security/dast/checks/798.66.md
+++ b/doc/user/application_security/dast/checks/798.66.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.66.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Linear API Token
+This document was moved to [another location](../browser/checks/798.66.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Linear API Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.66 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.67.md b/doc/user/application_security/dast/checks/798.67.md
index 8f64103c0ea2fae99eb5df6678aedaf78240efd8..00ba6299ecfb392b02a69c6c43dbfbf1ef8f667b 100644
--- a/doc/user/application_security/dast/checks/798.67.md
+++ b/doc/user/application_security/dast/checks/798.67.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.67.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Linear Client Secret
+This document was moved to [another location](../browser/checks/798.67.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Linear Client Secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.67 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.68.md b/doc/user/application_security/dast/checks/798.68.md
index 59c1c6067dd1a85956c6cdbdbb0f094849136a9e..6242e80bbf0b46bf2a95dbb63e8c9721cfb33041 100644
--- a/doc/user/application_security/dast/checks/798.68.md
+++ b/doc/user/application_security/dast/checks/798.68.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.68.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token LinkedIn Client ID
+This document was moved to [another location](../browser/checks/798.68.md).
 
-## Description
-
-The response body contains content that matches the pattern of a LinkedIn Client ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.68 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.69.md b/doc/user/application_security/dast/checks/798.69.md
index 46c0c82f997a4e4d8b6f57c4201c8f5048323531..75ca5deb29fb2b2eab3b1a5fe74ff9d8ed73c925 100644
--- a/doc/user/application_security/dast/checks/798.69.md
+++ b/doc/user/application_security/dast/checks/798.69.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.69.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token LinkedIn Client secret
+This document was moved to [another location](../browser/checks/798.69.md).
 
-## Description
-
-The response body contains content that matches the pattern of a LinkedIn Client secret.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.69 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.7.md b/doc/user/application_security/dast/checks/798.7.md
index 33cbd9f22a9b5a5f3e55de4e824bd2c64f8e11f0..3f3e29f44c440ac27086b8e6c277f4b4cc8231f5 100644
--- a/doc/user/application_security/dast/checks/798.7.md
+++ b/doc/user/application_security/dast/checks/798.7.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.7.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Alibaba AccessKey ID
+This document was moved to [another location](../browser/checks/798.7.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Alibaba AccessKey ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.7 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.70.md b/doc/user/application_security/dast/checks/798.70.md
index 07a345c2173838c4045d3b3c4fd3e8c824b5a8c4..55492352823d061667d8b30ff48d226192d4e24e 100644
--- a/doc/user/application_security/dast/checks/798.70.md
+++ b/doc/user/application_security/dast/checks/798.70.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.70.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Lob API Key
+This document was moved to [another location](../browser/checks/798.70.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Lob API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.70 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.72.md b/doc/user/application_security/dast/checks/798.72.md
index 0544c0c7079ae1d91052eb43fcdb9f2ac994de93..88c87313f91fa940d9a6f88b3a1bcf9d1ed13e39 100644
--- a/doc/user/application_security/dast/checks/798.72.md
+++ b/doc/user/application_security/dast/checks/798.72.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.72.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Mailchimp API key
+This document was moved to [another location](../browser/checks/798.72.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Mailchimp API key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.72 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.74.md b/doc/user/application_security/dast/checks/798.74.md
index 0de447fff1e53efb7201109f762cc802caf90926..db6b8922719dd09d85479110d7f0f6e39aaaa306 100644
--- a/doc/user/application_security/dast/checks/798.74.md
+++ b/doc/user/application_security/dast/checks/798.74.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.74.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Mailgun private API token
+This document was moved to [another location](../browser/checks/798.74.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Mailgun private API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.74 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.75.md b/doc/user/application_security/dast/checks/798.75.md
index 15ee8df124e6b21d9484f2d03c62f9b38ae02e94..ef4220cca757103aee68cff959af9c3181250f9c 100644
--- a/doc/user/application_security/dast/checks/798.75.md
+++ b/doc/user/application_security/dast/checks/798.75.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.75.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Mailgun webhook signing key
+This document was moved to [another location](../browser/checks/798.75.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Mailgun webhook signing key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.75 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.77.md b/doc/user/application_security/dast/checks/798.77.md
index 47efba890e66c38777a77f3a298c379809baa12f..1f20e84c22cb964e75bec4b36f55595bc423d251 100644
--- a/doc/user/application_security/dast/checks/798.77.md
+++ b/doc/user/application_security/dast/checks/798.77.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.77.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Mattermost Access Token
+This document was moved to [another location](../browser/checks/798.77.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Mattermost Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.77 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.78.md b/doc/user/application_security/dast/checks/798.78.md
index 9905508136c3ae43135d9097b77357809112fb51..0f45370e6c17e9899ea7db66d8dd1fed569bbb91 100644
--- a/doc/user/application_security/dast/checks/798.78.md
+++ b/doc/user/application_security/dast/checks/798.78.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.78.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token MessageBird API token
+This document was moved to [another location](../browser/checks/798.78.md).
 
-## Description
-
-The response body contains content that matches the pattern of a MessageBird API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.78 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.8.md b/doc/user/application_security/dast/checks/798.8.md
index 3c0b0319a038ba07cf6441a83c1d1aa05a32a960..ae6294fc0eefcfdd0c02c0ea548485676a856319 100644
--- a/doc/user/application_security/dast/checks/798.8.md
+++ b/doc/user/application_security/dast/checks/798.8.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.8.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Alibaba Secret Key
+This document was moved to [another location](../browser/checks/798.8.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Alibaba Secret Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.8 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.80.md b/doc/user/application_security/dast/checks/798.80.md
index abfb6cb8025cd16e9229c0ebef71db1f3dec1420..e1e3d1884b67b1c9e1496c8fcd69a3e362cea6ee 100644
--- a/doc/user/application_security/dast/checks/798.80.md
+++ b/doc/user/application_security/dast/checks/798.80.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.80.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Netlify Access Token
+This document was moved to [another location](../browser/checks/798.80.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Netlify Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.80 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.81.md b/doc/user/application_security/dast/checks/798.81.md
index accdbde0f6aa81d879867fff934b470eabb6881d..ac28faf323210ba6a53915feb136dcac1fb6d49d 100644
--- a/doc/user/application_security/dast/checks/798.81.md
+++ b/doc/user/application_security/dast/checks/798.81.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.81.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token New Relic user API Key
+This document was moved to [another location](../browser/checks/798.81.md).
 
-## Description
-
-The response body contains content that matches the pattern of a New Relic user API Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.81 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.82.md b/doc/user/application_security/dast/checks/798.82.md
index 9d1acb2335ab9c0e0cda8c7a95fd14fb9fffe33e..b117a58fff80882ed87ad63e86a999093e00c1aa 100644
--- a/doc/user/application_security/dast/checks/798.82.md
+++ b/doc/user/application_security/dast/checks/798.82.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.82.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token New Relic user API ID
+This document was moved to [another location](../browser/checks/798.82.md).
 
-## Description
-
-The response body contains content that matches the pattern of a New Relic user API ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.82 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.83.md b/doc/user/application_security/dast/checks/798.83.md
index 900b96ed210232ab39fe962a7ff2181d400d7786..cb6d796427bd863d62326db9ef2262d2c0995783 100644
--- a/doc/user/application_security/dast/checks/798.83.md
+++ b/doc/user/application_security/dast/checks/798.83.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.83.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token New Relic ingest browser API token
+This document was moved to [another location](../browser/checks/798.83.md).
 
-## Description
-
-The response body contains content that matches the pattern of a New Relic ingest browser API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.83 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.84.md b/doc/user/application_security/dast/checks/798.84.md
index e53a23e10167f568966b2548f77bee0c447ea231..189d455f8f00b5fe9ed7ddb09cd6d6d5aad1e911 100644
--- a/doc/user/application_security/dast/checks/798.84.md
+++ b/doc/user/application_security/dast/checks/798.84.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.84.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token npm access token
+This document was moved to [another location](../browser/checks/798.84.md).
 
-## Description
-
-The response body contains content that matches the pattern of a npm access token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.84 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.86.md b/doc/user/application_security/dast/checks/798.86.md
index 82581b62391b754d8e5efb093f7bf7c65a962e51..8a01666a160a29db3aa378bc993bc1dcd62d59e9 100644
--- a/doc/user/application_security/dast/checks/798.86.md
+++ b/doc/user/application_security/dast/checks/798.86.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.86.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Okta Access Token
+This document was moved to [another location](../browser/checks/798.86.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Okta Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.86 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.87.md b/doc/user/application_security/dast/checks/798.87.md
index 1c79c58f096a0a843b556f8d524880ce5682602e..d0b59e17b9c15fed647c969b192c37b7ce394972 100644
--- a/doc/user/application_security/dast/checks/798.87.md
+++ b/doc/user/application_security/dast/checks/798.87.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.87.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Plaid Client ID
+This document was moved to [another location](../browser/checks/798.87.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Plaid Client ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.87 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.88.md b/doc/user/application_security/dast/checks/798.88.md
index 404704dde2142653666fbf2c2039d90f297778fe..3a8ec3809aa4294bf74f6489ae1880bc427fc1b8 100644
--- a/doc/user/application_security/dast/checks/798.88.md
+++ b/doc/user/application_security/dast/checks/798.88.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.88.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Plaid Secret key
+This document was moved to [another location](../browser/checks/798.88.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Plaid Secret key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.88 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.89.md b/doc/user/application_security/dast/checks/798.89.md
index 690d1d5b0aff7183358c9212a8947ce3cbd22b10..1e5986485bacb774a96ac13834e7ca36623500e2 100644
--- a/doc/user/application_security/dast/checks/798.89.md
+++ b/doc/user/application_security/dast/checks/798.89.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.89.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Plaid API Token
+This document was moved to [another location](../browser/checks/798.89.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Plaid API Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.89 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.9.md b/doc/user/application_security/dast/checks/798.9.md
index fd4a2f3cafcc182b3595e64cdebd46fdef976404..c4cb57c2242d992749816a311b131230af45d0bf 100644
--- a/doc/user/application_security/dast/checks/798.9.md
+++ b/doc/user/application_security/dast/checks/798.9.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.9.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Asana Client ID
+This document was moved to [another location](../browser/checks/798.9.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Asana Client ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.9 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.90.md b/doc/user/application_security/dast/checks/798.90.md
index b1d0db82d076c76e827ea79da993b7752b89253d..0776d017288b4941236fe2e7a91099ab87799baa 100644
--- a/doc/user/application_security/dast/checks/798.90.md
+++ b/doc/user/application_security/dast/checks/798.90.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.90.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token PlanetScale password
+This document was moved to [another location](../browser/checks/798.90.md).
 
-## Description
-
-The response body contains content that matches the pattern of a PlanetScale password.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.90 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.91.md b/doc/user/application_security/dast/checks/798.91.md
index 104731daae9e0b5879b878d48f1506eb714ef10f..1d952da1ce6b4836addd5e499f5fed5be479ad2e 100644
--- a/doc/user/application_security/dast/checks/798.91.md
+++ b/doc/user/application_security/dast/checks/798.91.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.91.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token PlanetScale API token
+This document was moved to [another location](../browser/checks/798.91.md).
 
-## Description
-
-The response body contains content that matches the pattern of a PlanetScale API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.91 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.92.md b/doc/user/application_security/dast/checks/798.92.md
index fbd5346d681a2f1afe13e3da1664e35392851410..6e07fe064041fa3e806e79a203a34389106baadf 100644
--- a/doc/user/application_security/dast/checks/798.92.md
+++ b/doc/user/application_security/dast/checks/798.92.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.92.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token PlanetScale OAuth token
+This document was moved to [another location](../browser/checks/798.92.md).
 
-## Description
-
-The response body contains content that matches the pattern of a PlanetScale OAuth token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.92 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.93.md b/doc/user/application_security/dast/checks/798.93.md
index 314f9a51dc44c2579d23e1d3f03770b48481ba4e..8209b252a1726dcee0b1f60bed64295255600a97 100644
--- a/doc/user/application_security/dast/checks/798.93.md
+++ b/doc/user/application_security/dast/checks/798.93.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.93.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Postman API token
+This document was moved to [another location](../browser/checks/798.93.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Postman API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.93 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.94.md b/doc/user/application_security/dast/checks/798.94.md
index 29bf93e80d730d5f1fd3e458dea06a0442527249..f7d47d35b51d2949e3d65dcd3552007fedf4f5e3 100644
--- a/doc/user/application_security/dast/checks/798.94.md
+++ b/doc/user/application_security/dast/checks/798.94.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.94.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Private Key
+This document was moved to [another location](../browser/checks/798.94.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Private Key.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.94 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.95.md b/doc/user/application_security/dast/checks/798.95.md
index d583fff0e1456c14cfcaabac2d69fedb1b6bedba..7199420d48bd317a9f27ff17c38dcfa419e777e9 100644
--- a/doc/user/application_security/dast/checks/798.95.md
+++ b/doc/user/application_security/dast/checks/798.95.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.95.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Pulumi API token
+This document was moved to [another location](../browser/checks/798.95.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Pulumi API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.95 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.96.md b/doc/user/application_security/dast/checks/798.96.md
index b52230140d766a9dbd924c26cfc360c3a08c11e7..3e660b93cf15c2cda0706b58a055d5693987b8f3 100644
--- a/doc/user/application_security/dast/checks/798.96.md
+++ b/doc/user/application_security/dast/checks/798.96.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.96.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token PyPI upload token
+This document was moved to [another location](../browser/checks/798.96.md).
 
-## Description
-
-The response body contains content that matches the pattern of a PyPI upload token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.96 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.97.md b/doc/user/application_security/dast/checks/798.97.md
index 37bda02dfe01d0a8c6ddceb0f99d88975218b1b6..9c94a6482cea00f7dc027595de591ed8b87444cf 100644
--- a/doc/user/application_security/dast/checks/798.97.md
+++ b/doc/user/application_security/dast/checks/798.97.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.97.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token RubyGems API token
+This document was moved to [another location](../browser/checks/798.97.md).
 
-## Description
-
-The response body contains content that matches the pattern of a RubyGems API token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.97 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.98.md b/doc/user/application_security/dast/checks/798.98.md
index 8b8fc555a69686d5d866d9d396c3d05aa12339f2..763e46f4aac3243d22cbff60badf2e3b6fcf9c11 100644
--- a/doc/user/application_security/dast/checks/798.98.md
+++ b/doc/user/application_security/dast/checks/798.98.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.98.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token RapidAPI Access Token
+This document was moved to [another location](../browser/checks/798.98.md).
 
-## Description
-
-The response body contains content that matches the pattern of a RapidAPI Access Token.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.98 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/798.99.md b/doc/user/application_security/dast/checks/798.99.md
index bd5060582b9aad90f331db4b2a123cc3b623ca10..b50e7862fcd595da75b1bb188a48bc142aef9f8f 100644
--- a/doc/user/application_security/dast/checks/798.99.md
+++ b/doc/user/application_security/dast/checks/798.99.md
@@ -1,26 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/798.99.md'
+remove_date: '2024-05-16'
 ---
 
-# Exposure of confidential secret or token Sendbird Access ID
+This document was moved to [another location](../browser/checks/798.99.md).
 
-## Description
-
-The response body contains content that matches the pattern of a Sendbird Access ID.
-Exposing this value could allow attackers to gain access to all resources granted by this token.
-
-## Remediation
-
-Review the response body content and remove any exposed values.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 798.99 | false | 798 | Passive | High |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/798.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/829.1.md b/doc/user/application_security/dast/checks/829.1.md
index 9cf12c3fecbac9e85dd327fd753a5120e9d611a7..7d6cc8d3fc9f26b2d3944ea7dd9c9a576366c74a 100644
--- a/doc/user/application_security/dast/checks/829.1.md
+++ b/doc/user/application_security/dast/checks/829.1.md
@@ -1,48 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/829.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Inclusion of Functionality from Untrusted Control Sphere
+This document was moved to [another location](../browser/checks/798.9.md).
 
-## Description
-
-JavaScript or CSS source files are included from third party domains without
-[Sub-Resource Integrity (SRI)](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity).
-If an attacker were to compromise the sites hosting these third party resources, they could inject malicious
-script or CSS data in an attempt to compromise users of your application. However, if SRI was applied and an
-attacker attempted to modify the contents of the script, the browser would not load the script and your
-applications users would be protected from the malicious alterations.
-
-## Remediation
-
-All identified resources should be sourced from the same domain as the target application. If this is not
-possible, it is strongly recommended that all `script` tags that implement `src` values, or `link` tags
-that implement the `href` values include Sub-Resource Integrity. To generate SRI integrity values the
-[SRI hash](https://www.srihash.org/) tool can be used, or by running one of the following commands:
-
-- `cat FILENAME.js | openssl dgst -sha384 -binary | openssl base64 -A`
-- `shasum -b -a 384 FILENAME.js | awk '{ print $1 }' | xxd -r -p | base64`
-
-The output of these tools must be added as additional attributes, in particular: `integrity` and either
-`crossorigin=anonymous` or `crossorigin=use-credentials`.
-An example of a valid SRI protected script tag can be found below:
-
-```html
-<script src="https://example.com/example-framework.js"
-    integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxy9rx7HNQlGYl1kPzQho1wx4JwY8wC"
-    crossorigin="anonymous"></script>
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 829.1 | true | 829 | Passive | Low |
-
-## Links
-
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Third_Party_Javascript_Management_Cheat_Sheet.html#subresource-integrity)
-- [CWE](https://cwe.mitre.org/data/definitions/829.html)
-- [MDN](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/829.2.md b/doc/user/application_security/dast/checks/829.2.md
index edd6383baf3dbb8bf8350395a8932c0ff417f8b0..e515ef9d7535b978e2173e06edf7e566dd03669f 100644
--- a/doc/user/application_security/dast/checks/829.2.md
+++ b/doc/user/application_security/dast/checks/829.2.md
@@ -1,47 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/829.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Invalid Sub-Resource Integrity values detected
+This document was moved to [another location](../browser/checks/798.9.md).
 
-## Description
-
-JavaScript or CSS source files were found to contain invalid
-[Sub-Resource Integrity (SRI)](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity)
-`integrity` values or a missing `crossorigin` value. These scripts or links should be investigated to
-ensure they have not been maliciously altered. If in doubt, contact the owner of the scripts or replace
-them with known good versions.
-
-## Remediation
-
-All identified resources should be sourced from the same domain as the target application. If this is not
-possible, it is strongly recommended that all `script` tags that implement `src` values, or `link` tags
-that implement the `href` values include Sub-Resource Integrity. To generate SRI integrity values the
-[SRI hash](https://www.srihash.org/) tool can be used, or by running one of the following commands:
-
-- `cat FILENAME.js | openssl dgst -sha384 -binary | openssl base64 -A`
-- `shasum -b -a 384 FILENAME.js | awk '{ print $1 }' | xxd -r -p | base64`
-
-The output of these tools must be added as additional attributes, in particular: `integrity` and either
-`crossorigin=anonymous` or `crossorigin=use-credentials`.
-An example of a valid SRI protected script tag can be found below:
-
-```html
-<script src="https://example.com/example-framework.js"
-    integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxy9rx7HNQlGYl1kPzQho1wx4JwY8wC"
-    crossorigin="anonymous"></script>
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 829.2 | true | 829 | Passive | Medium |
-
-## Links
-
-- [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Third_Party_Javascript_Management_Cheat_Sheet.html#subresource-integrity)
-- [CWE](https://cwe.mitre.org/data/definitions/829.html)
-- [MDN](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/89.1.md b/doc/user/application_security/dast/checks/89.1.md
index f25c9c731143d9decc45f2b9341c8f938f0f095c..05caff54dc7d8ad205b4ebe24ffe11566227062f 100644
--- a/doc/user/application_security/dast/checks/89.1.md
+++ b/doc/user/application_security/dast/checks/89.1.md
@@ -1,37 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/89.1.md'
+remove_date: '2024-05-16'
 ---
 
-# SQL Injection
+This document was moved to [another location](../browser/checks/89.1.md).
 
-## Description
-
-It is possible to execute arbitrary SQL commands on the target application server's
-backend database.
-SQL Injection is a critical vulnerability that can lead to a data or system
-compromise.
-
-## Remediation
-
-Always use parameterized queries when issuing requests to backend database systems. In
-situations where dynamic queries must be created, never use direct user input, but
-instead use a map or dictionary of valid values and resolve them using a user-supplied key.
-
-For example, some database drivers do not allow parameterized queries for `>` or `<` comparison
-operators. In these cases, do not use a user-supplied `>` or `<` value, but rather have the user
-supply a `gt` or `lt` value. The alphabetical values are then used to look up the `>` and `<`
-values to be used in the construction of the dynamic query. The same goes for other queries where
-column or table names are required but can not be parameterized.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 89.1 | false | 89 | Active | high |
-
-## Links
-
-- [OWASP](https://owasp.org/www-community/attacks/SQL_Injection)
-- [CWE](https://cwe.mitre.org/data/definitions/89.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/917.1.md b/doc/user/application_security/dast/checks/917.1.md
index 16414974116382f8c525f4d258893bd39f71366b..6241fbbe127e5eb9273976cd8e54557cecf19e34 100644
--- a/doc/user/application_security/dast/checks/917.1.md
+++ b/doc/user/application_security/dast/checks/917.1.md
@@ -1,33 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/917.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Expression Language Injection
+This document was moved to [another location](../browser/checks/798.9.md).
 
-## Description
-
-It is possible to execute arbitrary Expression Language (EL) statements on the target
-application server. EL injection is a critical severity vulnerability that can lead to
-full system compromise. EL injection can occur when attacker-controlled data is used to construct
-EL statements without neutralizing special characters. These special characters could modify the
-intended EL statement prior to it being executed by an interpreter.
-
-## Remediation
-
-User-controlled data should always have special elements neutralized when used as part of
-constructing Expression Language statements. Consult the documentation for the EL
-interpreter in use on how properly neutralize user controlled data.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 917.1 | false | 917 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/917.html)
-- [OWASP](https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection)
-- [Expression Language Injection [PDF]](https://mindedsecurity.com/wp-content/uploads/2020/10/ExpressionLanguageInjection.pdf)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/918.1.md b/doc/user/application_security/dast/checks/918.1.md
index 9e4707e3a311fff010d339699b655d4947aa7a4d..d1143229b892d9f5aef06d5149c85b412ead9010 100644
--- a/doc/user/application_security/dast/checks/918.1.md
+++ b/doc/user/application_security/dast/checks/918.1.md
@@ -1,33 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/918.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Server-Side Request Forgery
+This document was moved to [another location](../browser/checks/798.9.md).
 
-## Description
-
-The application is susceptible to Server-Side Request Forgery (SSRF), a high-risk vulnerability
-that allows attackers to make unauthorized requests to internal and external resources. This
-vulnerability arises when user-controlled input is not properly validated or sanitized before
-being used in requests to resources, enabling attackers to manipulate these requests for
-malicious purposes.
-
-## Remediation
-
-Avoid using user-supplied data for constructing requests. If there is a business need for this,
-consider an allowlist approach and/or block requests to internal resources using firewall
-rules or a robust request library with anti-SSRF support.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 918.1 | false | 918 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/918.html)
-- [OWASP](https://owasp.org/www-community/attacks/Server_Side_Request_Forgery)
-- [Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/94.1.md b/doc/user/application_security/dast/checks/94.1.md
index f8a8b32c5dcee1d9bff756630e60dd03cfe72c33..83e965f47a5129630693e9ba2fd24f93860bc48d 100644
--- a/doc/user/application_security/dast/checks/94.1.md
+++ b/doc/user/application_security/dast/checks/94.1.md
@@ -1,53 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/94.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Server-side code injection (PHP)
+This document was moved to [another location](../browser/checks/94.1.md).
 
-## Description
-
-The target application was found vulnerable to code injection. A malicious actor could inject arbitrary
-PHP code to be executed on the server. This could lead to a full system compromise by accessing
-stored secrets, injecting code to take over accounts, or executing OS commands.
-
-## Remediation
-
-Never pass user input directly into functions which evaluate string data as code, such as `eval`.
-There is almost no benefit of passing string values to `eval`, as such the best recommendation is
-to replace the current logic with more safe implementations of dynamically evaluating logic with
-user input. One alternative is to use an `array()`, storing expected user inputs in an array
-key, and use that key as a look up to execute functions:
-
-```php
-$func_to_run = function()
-{
-    print('hello world');
-};
-
-$function_map = array();
-$function_map["fn"] = $func_to_run; // store additional input to function mappings here
-
-$input = "fn";
-
-// lookup "fn" as the key
-if (array_key_exists($input, $function_map)) {
-    // run the $func_to_run that was stored in the "fn" array hash value.
-    $func = $function_map[$input];
-    $func();
-} else {
-    print('invalid input');
-}
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 94.1 | false | 94 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/94.html)
-- [OWASP](https://owasp.org/www-community/attacks/Code_Injection)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/94.2.md b/doc/user/application_security/dast/checks/94.2.md
index 1c3e5b2993bfdb686237a8cb6292d9a45ec2d0ee..bdc95339b9a927197638785d927ead4836c8630d 100644
--- a/doc/user/application_security/dast/checks/94.2.md
+++ b/doc/user/application_security/dast/checks/94.2.md
@@ -1,51 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/94.2.md'
+remove_date: '2024-05-16'
 ---
 
-# Server-side code injection (Ruby)
+This document was moved to [another location](../browser/checks/94.2.md).
 
-## Description
-
-The target application was found vulnerable to code injection. A malicious actor could inject arbitrary
-Ruby code to be executed on the server. This could lead to a full system compromise by accessing
-stored secrets, injecting code to take over accounts, or executing OS commands.
-
-## Remediation
-
-Never pass user input directly into functions which evaluate string data as code, such as `eval`,
-`send`, `public_send`, `instance_eval` or `class_eval`. There is almost no benefit of passing string
-values to these methods, as such the best recommendation is to replace the current logic with more safe
-implementations of dynamically evaluating logic with user input. If using `send` or `public_send` ensure
-the first argument is to a known, hardcoded method/symbol and does not come from user input.
-
-For `eval`, `instance_eval` and `class_eval`, user input should never be sent directly to these methods.
-One alternative is to store functions or methods in a Hash that can be looked up using a key. If the key
-exists, the function can be executed.
-
-```ruby
-def func_to_run
-  puts 'hello world'
-end
-
-input = 'fn'
-
-function_map = { fn: method(:func_to_run) }
-
-if function_map.key?(input.to_sym)
-  function_map[input.to_sym].call
-else
-  puts 'invalid input'
-end
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 94.2 | false | 94 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/94.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/94.3.md b/doc/user/application_security/dast/checks/94.3.md
index a38b4c02dd07711af57c01b5cc450346ada8db7e..8680a73b486e0ff644566ff49238c0cb41fe38a0 100644
--- a/doc/user/application_security/dast/checks/94.3.md
+++ b/doc/user/application_security/dast/checks/94.3.md
@@ -1,45 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/94.3.md'
+remove_date: '2024-05-16'
 ---
 
-# Server-side code injection (Python)
+This document was moved to [another location](../browser/checks/94.3.md).
 
-## Description
-
-The target application was found vulnerable to code injection. A malicious actor could inject arbitrary
-Python code to be executed on the server. This could lead to a full system compromise by accessing
-stored secrets, injecting code to take over accounts, or executing OS commands.
-
-## Remediation
-
-Never pass user input directly into functions which evaluate string data as code, such as `eval`,
-or `exec`. There is almost no benefit of passing string values to these methods, as such the best
-recommendation is to replace the current logic with more safe implementations of dynamically evaluating
-logic with user input. One alternative is to store functions or methods in a hashmap that can be looked
-up using a key. If the key exists, the function can be executed.
-
-```python
-def func_to_run():
-    print('hello world')
-
-function_map = {'fn': func_to_run}
-
-input = 'fn'
-
-if input in function_map:
-    function_map[input]()
-else:
-    print('invalid input')
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 94.3 | false | 94 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/94.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/94.4.md b/doc/user/application_security/dast/checks/94.4.md
index 64d089bb7e7f358f49bc142469e4e2a341cbb2e2..8680a73b486e0ff644566ff49238c0cb41fe38a0 100644
--- a/doc/user/application_security/dast/checks/94.4.md
+++ b/doc/user/application_security/dast/checks/94.4.md
@@ -1,49 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/94.3.md'
+remove_date: '2024-05-16'
 ---
 
-# Server-side code injection (NodeJS)
+This document was moved to [another location](../browser/checks/94.3.md).
 
-## Description
-
-The target application was found vulnerable to code injection. A malicious actor could inject arbitrary
-JavaScript code to be executed on the server. This could lead to a full system compromise by accessing
-stored secrets, injecting code to take over accounts, or executing OS commands.
-
-## Remediation
-
-Never pass user input directly into functions which evaluate string data as code, such as `eval`, `setTimeout`
-or `setInterval`. There is almost no benefit of passing string values to these methods, as such the best
-recommendation is to replace the current logic with more safe implementations of dynamically evaluating
-logic with user input. One alternative is to store functions or methods in a Map that can be looked
-up using a key. If the key exists, the function can be executed.
-
-```javascript
-const function_map = new Map();
-
-function_map.set('fn', function() {
-    console.log('hello world');
-})
-
-const input = 'fn2';
-
-const fn = function_map.get(input)
-
-if (fn) {
-    fn();
-} else {
-    console.log('invalid input');
-}
-```
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 94.4 | false | 94 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/94.html)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/943.1.md b/doc/user/application_security/dast/checks/943.1.md
index 7cdefec91c714b34f08347b67e7cd6aa441b345f..681f7586399566f4f7cb0ab969b6a2680aebedb2 100644
--- a/doc/user/application_security/dast/checks/943.1.md
+++ b/doc/user/application_security/dast/checks/943.1.md
@@ -1,30 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/943.1.md'
+remove_date: '2024-05-16'
 ---
 
-# Improper neutralization of special elements in data query logic
+This document was moved to [another location](../browser/checks/798.9.md).
 
-## Description
-
-The application generates a query intended to interact with MongoDB,
-but it does not neutralize or incorrectly neutralizes special elements
-that can modify the intended logic of the query.
-
-## Remediation
-
-Refactor find or search queries to use standard
-filtering operators such as `$gt` or `$in` instead of broad operators such
-as `$where`. If possible, disable the MongoDB JavaScript interface entirely.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 943.1 | false | 943 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/943.html)
-- [Disabling MongoDB Server Side JS](https://www.mongodb.com/docs/manual/core/server-side-javascript/#std-label-disable-server-side-js)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/98.1.md b/doc/user/application_security/dast/checks/98.1.md
index 8931bde2b57cd2ecaf86026dd75e7a50becb128d..bb928344623982af71ff0667f49c8b8fb64db42c 100644
--- a/doc/user/application_security/dast/checks/98.1.md
+++ b/doc/user/application_security/dast/checks/98.1.md
@@ -1,34 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/98.1.md'
+remove_date: '2024-05-16'
 ---
 
-# PHP Remote File Inclusion
+This document was moved to [another location](../browser/checks/98.1.md).
 
-## Description
-
-The server is vulnerable to PHP Remote File Inclusion (RFI), which enables attackers to load
-remote files and have them executed as PHP scripts on the server side. This vulnerability occurs
-when untrusted user input is directly used in script inclusion without proper validation. Attackers
-can leverage this vulnerability to include and execute arbitrary remote files, potentially
-compromising the system's integrity and confidentiality.
-
-## Remediation
-
-Avoid using user-controlled data directly in `include` and `require` statements and instead consider
-an allow-list approach for dynamically including scripts.
-
-If possible, also consider setting `allow_url_include=Off` in the server's PHP configuration to
-ensure URLs cannot be used in `include` and `require` statements.
-
-## Details
-
-| ID | Aggregated | CWE | Type | Risk |
-|:---|:--------|:--------|:--------|:--------|
-| 98.1 | false | 98 | Active | high |
-
-## Links
-
-- [CWE](https://cwe.mitre.org/data/definitions/98.html)
-- [File inclusion Vulnerability - Wikipedia](https://en.wikipedia.org/wiki/File_inclusion_vulnerability)
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/checks/index.md b/doc/user/application_security/dast/checks/index.md
index ac1e1bc23322fa32e48db3c7ee6821d8a1c2b35d..7222fdec1e02bd376515a74e9be8a50f097095c2 100644
--- a/doc/user/application_security/dast/checks/index.md
+++ b/doc/user/application_security/dast/checks/index.md
@@ -1,189 +1,11 @@
 ---
-stage: Secure
-group: Dynamic Analysis
-info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
+redirect_to: '../browser/checks/index.md'
+remove_date: '2024-05-16'
 ---
 
-# DAST browser-based crawler vulnerability checks
+This document was moved to [another location](../browser/checks/index.md).
 
-DETAILS:
-**Tier:** Ultimate
-**Offering:** SaaS, Self-managed
-
-The [DAST browser-based crawler](../browser_based.md) provides a number of vulnerability checks that are used to scan for vulnerabilities in the site under test.
-
-## Passive Checks
-
-| ID | Check | Severity | Type |
-|:---|:------|:---------|:-----|
-| [1004.1](1004.1.md) | Sensitive cookie without HttpOnly attribute | Low | Passive |
-| [16.1](16.1.md) | Missing Content-Type header | Low | Passive |
-| [16.10](16.10.md) | Content-Security-Policy violations | Info | Passive |
-| [16.2](16.2.md) | Server header exposes version information | Low | Passive |
-| [16.3](16.3.md) | X-Powered-By header exposes version information | Low | Passive |
-| [16.4](16.4.md) | X-Backend-Server header exposes server information | Info | Passive |
-| [16.5](16.5.md) | AspNet header exposes version information | Low | Passive |
-| [16.6](16.6.md) | AspNetMvc header exposes version information | Low | Passive |
-| [16.7](16.7.md) | Strict-Transport-Security header missing or invalid | Low | Passive |
-| [16.8](16.8.md) | Content-Security-Policy analysis | Info | Passive |
-| [16.9](16.9.md) | Content-Security-Policy-Report-Only analysis | Info | Passive |
-| [200.1](200.1.md) | Exposure of sensitive information to an unauthorized actor (private IP address) | Low | Passive |
-| [209.1](209.1.md) | Generation of error message containing sensitive information | Low | Passive |
-| [209.2](209.2.md) | Generation of database error message containing sensitive information | Low | Passive |
-| [287.1](287.1.md) | Insecure authentication over HTTP (Basic Authentication) | Medium | Passive |
-| [287.2](287.2.md) | Insecure authentication over HTTP (Digest Authentication) | Low | Passive |
-| [319.1](319.1.md) | Mixed Content | Info | Passive |
-| [352.1](352.1.md) | Absence of anti-CSRF tokens | Medium | Passive |
-| [359.1](359.1.md) | Exposure of Private Personal Information (PII) to an unauthorized actor (credit card) | Medium | Passive |
-| [359.2](359.2.md) | Exposure of Private Personal Information (PII) to an unauthorized actor (United States social security number) | Medium | Passive |
-| [548.1](548.1.md) | Exposure of information through directory listing | Low | Passive |
-| [598.1](598.1.md) | Use of GET request method with sensitive query strings (session ID) | Medium | Passive |
-| [598.2](598.2.md) | Use of GET request method with sensitive query strings (password) | Medium | Passive |
-| [598.3](598.3.md) | Use of GET request method with sensitive query strings (Authorization header details) | Medium | Passive |
-| [601.1](601.1.md) | URL redirection to untrusted site ('open redirect') | Low | Passive |
-| [614.1](614.1.md) | Sensitive cookie without Secure attribute | Low | Passive |
-| [693.1](693.1.md) | Missing X-Content-Type-Options: nosniff | Low | Passive |
-| [798.1](798.1.md) | Exposure of confidential secret or token Adafruit API Key | High | Passive |
-| [798.2](798.2.md) | Exposure of confidential secret or token Adobe Client ID (OAuth Web) | High | Passive |
-| [798.3](798.3.md) | Exposure of confidential secret or token Adobe Client Secret | High | Passive |
-| [798.4](798.4.md) | Exposure of confidential secret or token Age secret key | High | Passive |
-| [798.5](798.5.md) | Exposure of confidential secret or token Airtable API Key | High | Passive |
-| [798.6](798.6.md) | Exposure of confidential secret or token Algolia API Key | High | Passive |
-| [798.7](798.7.md) | Exposure of confidential secret or token Alibaba AccessKey ID | High | Passive |
-| [798.8](798.8.md) | Exposure of confidential secret or token Alibaba Secret Key | High | Passive |
-| [798.9](798.9.md) | Exposure of confidential secret or token Asana Client ID | High | Passive |
-| [798.10](798.10.md) | Exposure of confidential secret or token Asana Client Secret | High | Passive |
-| [798.11](798.11.md) | Exposure of confidential secret or token Atlassian API token | High | Passive |
-| [798.12](798.12.md) | Exposure of confidential secret or token AWS | High | Passive |
-| [798.13](798.13.md) | Exposure of confidential secret or token Bitbucket Client ID | High | Passive |
-| [798.14](798.14.md) | Exposure of confidential secret or token Bitbucket Client Secret | High | Passive |
-| [798.15](798.15.md) | Exposure of confidential secret or token Bittrex Access Key | High | Passive |
-| [798.16](798.16.md) | Exposure of confidential secret or token Bittrex Secret Key | High | Passive |
-| [798.17](798.17.md) | Exposure of confidential secret or token Beamer API token | High | Passive |
-| [798.18](798.18.md) | Exposure of confidential secret or token Codecov Access Token | High | Passive |
-| [798.19](798.19.md) | Exposure of confidential secret or token Coinbase Access Token | High | Passive |
-| [798.20](798.20.md) | Exposure of confidential secret or token Clojars API token | High | Passive |
-| [798.21](798.21.md) | Exposure of confidential secret or token Confluent Access Token | High | Passive |
-| [798.22](798.22.md) | Exposure of confidential secret or token Confluent Secret Key | High | Passive |
-| [798.23](798.23.md) | Exposure of confidential secret or token Contentful delivery API token | High | Passive |
-| [798.24](798.24.md) | Exposure of confidential secret or token Databricks API token | High | Passive |
-| [798.25](798.25.md) | Exposure of confidential secret or token Datadog Access Token | High | Passive |
-| [798.26](798.26.md) | Exposure of confidential secret or token Discord API key | High | Passive |
-| [798.27](798.27.md) | Exposure of confidential secret or token Discord client ID | High | Passive |
-| [798.28](798.28.md) | Exposure of confidential secret or token Discord client secret | High | Passive |
-| [798.29](798.29.md) | Exposure of confidential secret or token Doppler API token | High | Passive |
-| [798.30](798.30.md) | Exposure of confidential secret or token Dropbox API secret | High | Passive |
-| [798.31](798.31.md) | Exposure of confidential secret or token Dropbox long lived API token | High | Passive |
-| [798.32](798.32.md) | Exposure of confidential secret or token Dropbox short lived API token | High | Passive |
-| [798.33](798.33.md) | Exposure of confidential secret or token Drone CI Access Token | High | Passive |
-| [798.34](798.34.md) | Exposure of confidential secret or token Duffel API token | High | Passive |
-| [798.35](798.35.md) | Exposure of confidential secret or token Dynatrace API token | High | Passive |
-| [798.36](798.36.md) | Exposure of confidential secret or token EasyPost API token | High | Passive |
-| [798.37](798.37.md) | Exposure of confidential secret or token EasyPost test API token | High | Passive |
-| [798.38](798.38.md) | Exposure of confidential secret or token Etsy Access Token | High | Passive |
-| [798.39](798.39.md) | Exposure of confidential secret or token Facebook | High | Passive |
-| [798.40](798.40.md) | Exposure of confidential secret or token Fastly API key | High | Passive |
-| [798.41](798.41.md) | Exposure of confidential secret or token Finicity Client Secret | High | Passive |
-| [798.42](798.42.md) | Exposure of confidential secret or token Finicity API token | High | Passive |
-| [798.43](798.43.md) | Exposure of confidential secret or token Flickr Access Token | High | Passive |
-| [798.44](798.44.md) | Exposure of confidential secret or token Finnhub Access Token | High | Passive |
-| [798.46](798.46.md) | Exposure of confidential secret or token Flutterwave Secret Key | High | Passive |
-| [798.47](798.47.md) | Exposure of confidential secret or token Flutterwave Encryption Key | High | Passive |
-| [798.48](798.48.md) | Exposure of confidential secret or token Frame.io API token | High | Passive |
-| [798.49](798.49.md) | Exposure of confidential secret or token FreshBooks Access Token | High | Passive |
-| [798.50](798.50.md) | Exposure of confidential secret or token GoCardless API token | High | Passive |
-| [798.52](798.52.md) | Exposure of confidential secret or token GitHub Personal Access Token | High | Passive |
-| [798.53](798.53.md) | Exposure of confidential secret or token GitHub OAuth Access Token | High | Passive |
-| [798.54](798.54.md) | Exposure of confidential secret or token GitHub App Token | High | Passive |
-| [798.55](798.55.md) | Exposure of confidential secret or token GitHub Refresh Token | High | Passive |
-| [798.56](798.56.md) | Exposure of confidential secret or token GitLab Personal Access Token | High | Passive |
-| [798.57](798.57.md) | Exposure of confidential secret or token Gitter Access Token | High | Passive |
-| [798.58](798.58.md) | Exposure of confidential secret or token HashiCorp Terraform user/org API token | High | Passive |
-| [798.59](798.59.md) | Exposure of confidential secret or token Heroku API Key | High | Passive |
-| [798.60](798.60.md) | Exposure of confidential secret or token HubSpot API Token | High | Passive |
-| [798.61](798.61.md) | Exposure of confidential secret or token Intercom API Token | High | Passive |
-| [798.62](798.62.md) | Exposure of confidential secret or token Kraken Access Token | High | Passive |
-| [798.63](798.63.md) | Exposure of confidential secret or token Kucoin Access Token | High | Passive |
-| [798.64](798.64.md) | Exposure of confidential secret or token Kucoin Secret Key | High | Passive |
-| [798.65](798.65.md) | Exposure of confidential secret or token LaunchDarkly Access Token | High | Passive |
-| [798.66](798.66.md) | Exposure of confidential secret or token Linear API Token | High | Passive |
-| [798.67](798.67.md) | Exposure of confidential secret or token Linear Client Secret | High | Passive |
-| [798.68](798.68.md) | Exposure of confidential secret or token LinkedIn Client ID | High | Passive |
-| [798.69](798.69.md) | Exposure of confidential secret or token LinkedIn Client secret | High | Passive |
-| [798.70](798.70.md) | Exposure of confidential secret or token Lob API Key | High | Passive |
-| [798.72](798.72.md) | Exposure of confidential secret or token Mailchimp API key | High | Passive |
-| [798.74](798.74.md) | Exposure of confidential secret or token Mailgun private API token | High | Passive |
-| [798.75](798.75.md) | Exposure of confidential secret or token Mailgun webhook signing key | High | Passive |
-| [798.77](798.77.md) | Exposure of confidential secret or token Mattermost Access Token | High | Passive |
-| [798.78](798.78.md) | Exposure of confidential secret or token MessageBird API token | High | Passive |
-| [798.80](798.80.md) | Exposure of confidential secret or token Netlify Access Token | High | Passive |
-| [798.81](798.81.md) | Exposure of confidential secret or token New Relic user API Key | High | Passive |
-| [798.82](798.82.md) | Exposure of confidential secret or token New Relic user API ID | High | Passive |
-| [798.83](798.83.md) | Exposure of confidential secret or token New Relic ingest browser API token | High | Passive |
-| [798.84](798.84.md) | Exposure of confidential secret or token npm access token | High | Passive |
-| [798.86](798.86.md) | Exposure of confidential secret or token Okta Access Token | High | Passive |
-| [798.87](798.87.md) | Exposure of confidential secret or token Plaid Client ID | High | Passive |
-| [798.88](798.88.md) | Exposure of confidential secret or token Plaid Secret key | High | Passive |
-| [798.89](798.89.md) | Exposure of confidential secret or token Plaid API Token | High | Passive |
-| [798.90](798.90.md) | Exposure of confidential secret or token PlanetScale password | High | Passive |
-| [798.91](798.91.md) | Exposure of confidential secret or token PlanetScale API token | High | Passive |
-| [798.92](798.92.md) | Exposure of confidential secret or token PlanetScale OAuth token | High | Passive |
-| [798.93](798.93.md) | Exposure of confidential secret or token Postman API token | High | Passive |
-| [798.94](798.94.md) | Exposure of confidential secret or token Private Key | High | Passive |
-| [798.95](798.95.md) | Exposure of confidential secret or token Pulumi API token | High | Passive |
-| [798.96](798.96.md) | Exposure of confidential secret or token PyPI upload token | High | Passive |
-| [798.97](798.97.md) | Exposure of confidential secret or token RubyGems API token | High | Passive |
-| [798.98](798.98.md) | Exposure of confidential secret or token RapidAPI Access Token | High | Passive |
-| [798.99](798.99.md) | Exposure of confidential secret or token Sendbird Access ID | High | Passive |
-| [798.100](798.100.md) | Exposure of confidential secret or token Sendbird Access Token | High | Passive |
-| [798.101](798.101.md) | Exposure of confidential secret or token SendGrid API token | High | Passive |
-| [798.102](798.102.md) | Exposure of confidential secret or token Sendinblue API token | High | Passive |
-| [798.103](798.103.md) | Exposure of confidential secret or token Sentry Access Token | High | Passive |
-| [798.104](798.104.md) | Exposure of confidential secret or token Shippo API token | High | Passive |
-| [798.105](798.105.md) | Exposure of confidential secret or token Shopify access token | High | Passive |
-| [798.106](798.106.md) | Exposure of confidential secret or token Shopify custom access token | High | Passive |
-| [798.107](798.107.md) | Exposure of confidential secret or token Shopify private app access token | High | Passive |
-| [798.108](798.108.md) | Exposure of confidential secret or token Shopify shared secret | High | Passive |
-| [798.109](798.109.md) | Exposure of confidential secret or token Slack token | High | Passive |
-| [798.110](798.110.md) | Exposure of confidential secret or token Slack Webhook | High | Passive |
-| [798.111](798.111.md) | Exposure of confidential secret or token Stripe | High | Passive |
-| [798.112](798.112.md) | Exposure of confidential secret or token Square Access Token | High | Passive |
-| [798.113](798.113.md) | Exposure of confidential secret or token Squarespace Access Token | High | Passive |
-| [798.114](798.114.md) | Exposure of confidential secret or token SumoLogic Access ID | High | Passive |
-| [798.115](798.115.md) | Exposure of confidential secret or token SumoLogic Access Token | High | Passive |
-| [798.116](798.116.md) | Exposure of confidential secret or token Travis CI Access Token | High | Passive |
-| [798.117](798.117.md) | Exposure of confidential secret or token Twilio API Key | High | Passive |
-| [798.118](798.118.md) | Exposure of confidential secret or token Twitch API token | High | Passive |
-| [798.119](798.119.md) | Exposure of confidential secret or token Twitter API Key | High | Passive |
-| [798.120](798.120.md) | Exposure of confidential secret or token Twitter API Secret | High | Passive |
-| [798.121](798.121.md) | Exposure of confidential secret or token Twitter Access Token | High | Passive |
-| [798.122](798.122.md) | Exposure of confidential secret or token Twitter Access Secret | High | Passive |
-| [798.123](798.123.md) | Exposure of confidential secret or token Twitter Bearer Token | High | Passive |
-| [798.124](798.124.md) | Exposure of confidential secret or token Typeform API token | High | Passive |
-| [798.125](798.125.md) | Exposure of confidential secret or token Yandex API Key | High | Passive |
-| [798.126](798.126.md) | Exposure of confidential secret or token Yandex AWS Access Token | High | Passive |
-| [798.127](798.127.md) | Exposure of confidential secret or token Yandex Access Token | High | Passive |
-| [798.128](798.128.md) | Exposure of confidential secret or token Zendesk Secret Key | High | Passive |
-| [829.1](829.1.md) | Inclusion of Functionality from Untrusted Control Sphere | Low | Passive |
-| [829.2](829.2.md) | Invalid Sub-Resource Integrity values detected | Medium | Passive |
-
-## Active Checks
-
-| ID | Check | Severity | Type |
-|:---|:------|:---------|:-----|
-| [113.1](113.1.md) | Improper Neutralization of CRLF Sequences in HTTP Headers | High | Active |
-| [1336.1](1336.1.md) | Server-Side Template Injection | High | Active |
-| [16.11](16.11.md) | TRACE HTTP method enabled | High | Active |
-| [22.1](22.1.md) | Improper limitation of a pathname to a restricted directory (Path traversal) | High | Active |
-| [611.1](611.1.md) | External XML Entity Injection (XXE) | High | Active |
-| [74.1](74.1.md) | XSLT Injection | High | Active |
-| [78.1](78.1.md) | OS Command Injection | High | Active |
-| [89.1](89.1.md) | SQL Injection | High | Active |
-| [917.1](917.1.md) | Expression Language Injection | High | Active |
-| [918.1](918.1.md) | Server-Side Request Forgery | High | Active |
-| [94.1](94.1.md) | Server-side code injection (PHP) | High | Active |
-| [94.2](94.2.md) | Server-side code injection (Ruby) | High | Active |
-| [94.3](94.3.md) | Server-side code injection (Python) | High | Active |
-| [94.4](94.4.md) | Server-side code injection (NodeJS) | High | Active |
-| [943.1](943.1.md) | Improper neutralization of special elements in data query logic | High | Active |
-| [98.1](98.1.md) | PHP Remote File Inclusion | High | Active |
+<!-- This redirect file can be deleted after 2024-05-16. -->
+<!-- Redirects that point to other docs in the same project expire in three months. -->
+<!-- Redirects that point to docs in a different project or site (for example, link is not relative and starts with `https:`) expire in one year. -->
+<!-- Before deletion, see: https://docs.gitlab.com/ee/development/documentation/redirects.html -->
diff --git a/doc/user/application_security/dast/on-demand_scan.md b/doc/user/application_security/dast/on-demand_scan.md
index ac192cc03159e5501ecfe122cb78885d9c49db48..ea0dbb31e6d5704a5dca6495c4a6c7017b2ccef8 100644
--- a/doc/user/application_security/dast/on-demand_scan.md
+++ b/doc/user/application_security/dast/on-demand_scan.md
@@ -30,8 +30,8 @@ a [site profile](#site-profile) defines **what** is to be scanned, and a
 
 An on-demand scan can be run in active or passive mode:
 
-- **Passive mode**: The default mode, which runs a [Passive Browser based scan](/ee/user/application_security/dast/browser_based.md#passive-scans).
-- **Active mode**: Runs an [Active Browser based scan](/ee/user/application_security/dast/browser_based.md#active-scans) which is potentially harmful to the site being scanned. To
+- **Passive mode**: The default mode, which runs a [Passive Browser based scan](browser/index.md#passive-scans).
+- **Active mode**: Runs an [Active Browser based scan](browser/index.md#active-scans) which is potentially harmful to the site being scanned. To
   minimize the risk of accidental damage, running an active scan requires a
   [validated site profile](#site-profile-validation).