Unfortunately, it looks like all the low-effort security reports we get are coming from this list. Many times, the "researcher" is actually reporting a vulnerability on their own machine (foo.localhost.pomerium.io).
https://github.com/sushiwushi/bug-bounty-dorks/blob/master/dorks.txt#L70
Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.
Pomerium can be used to:
provide a single-sign-on gateway to internal applications.
enforce dynamic access policy based on context, identity, and device identity.
aggregate access logs and telemetry data.
a VPN alternative.
Docs
For comprehensive docs, and tutorials see our documentation.