x-ms-request-url
could potentially be exposed, raising concerns about SQL injection risks. While PowerApps is known for its security, I believe there must be a way to prevent these headers from being exposed. Has anyone used Azure API Management (APIM) or Content Security Policy (CSP) for masking headers or preventing potential vulnerabilities? Any suggestions or best practices would be greatly appreciated!