Access Control: Access Control Vulnerability¶
Identifier:
access_control_agent
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
Access control vulnerabilities occur when applications fail to enforce proper authorization checks, allowing users to access resources or perform actions beyond their intended privileges.
How we test: We use AI-powered analysis to test for IDOR, privilege escalation, authentication bypass, and broken function-level authorization. We manipulate object references, session tokens, and role parameters to detect access control weaknesses.
References:
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.