akto
akto copied to clipboard
Proactive, Open source API security → API discovery, Testing in CI/CD, Test Library with 150+ Tests, Add custom tests, Sensitive data exposure
💭 Introduction: We want to test to check whether an attacker can create/update entity with an invalid UPI Id. 🎯 Requirements: 1. Filters - API with UPI ID as an...
💭 Introduction: We want a test to check whether an attacker can create/update entity with Parameter exclusion. 🎯 Requirements: 1. Filters - API with atleast one parameter as an input...
💭 Introduction: We want a test to check whether an attacker can create/update entity with File upload. 🎯 Requirements: 1. Filters - API with atleast one parameter as an input...
💭 Introduction: After starting a test run from the api collection, there is no confirmation that the test has been started or not. 🎯 Requirements: - A good understanding of...
CRLF injection is a web application security vulnerability that allows an attacker to inject carriage return (CR) and line feed (LF) characters into an HTTP request or response. This can...
# 💭 Introduction Akto is an open source API security product. Your task is to write a blog post about Akto's automated inventory feature. ### 🎯 Requirements - Your article...
💭 Introduction: GraphQL has gained a lot of popularity and love from the dev world. Its flexibility is one of the most powerful features. At the same time, it makes...
💭 Introduction: 🎯 Requirements: ✅ Task summary: Write a test to exploit recursive query vulnerability. Read more about the vulnerability [here](https://yarnpkg.com/package/graphql-depth-limit) As part of this test, you will have to...
💭 Introduction: mass assignment - https://blog.yeswehack.com/yeswerhackers/how-exploit-graphql-endpoint-bug-bounty/ 📚 Reading You can find a detailed documentation of test editor rules [here](https://docs.akto.io/test-editor/test-yaml-syntax-detailed) Find 100+ examples of YAML tests [here](https://github.com/akto-api-security/tests-library) ✅ Task summary: -...
💭 Introduction: We want to test whether API's which take in url as a param are vulnerable to do RCE on Redis using SSRF. You can refer [this](https://smarx.com/posts/2020/09/ssrf-to-redis-ctf-solution/) blog for...