idor-vulnerability-testing
This skill should be used when the user asks to "test for insecure direct object references," "fi...
Description
This skill should be used when the user asks to "test for insecure direct object references," "find IDOR vulnerabilities," "exploit broken access control," "enumerate user IDs or object references," or "bypass authorization to access other users' data." It provides comprehensive guidance for detecting, exploiting, and remediating IDOR vulnerabilities in web applications.
Skill File
Tags
Information
You Might Also Like
Defi Protocol Templates
Implement DeFi protocols with production-ready templates for staking, AMMs, governance, and lendi...
Nft Standards
Implement NFT standards (ERC-721, ERC-1155) with proper metadata handling, minting strategies, an...
Solidity Security
Master smart contract security best practices to prevent common vulnerabilities and implement sec...
Web3 Testing
Test smart contracts comprehensively using Hardhat and Foundry with unit tests, integration tests...
Mtls Configuration
Configure mutual TLS (mTLS) for zero-trust service-to-service communication
Auth Implementation Patterns
Master authentication and authorization patterns including JWT, OAuth2, session management, and R...