- What is the difference between an API pentest and a web application pentest?
- A web application pentest tests the full user-facing application including the browser UI and client-side logic. An API pentest focuses on the programmatic interface: endpoint enumeration, authentication mechanisms, authorization logic, input validation, rate limiting and business logic flaws. Many API vulnerabilities are invisible from the browser because they require crafted requests that the UI never generates.
- What does the OWASP API Security Top 10 cover?
- BOLA, Broken Authentication, Object Property Authorization, Resource Consumption, BFLA, Sensitive Business Flows, SSRF, Security Misconfiguration, Improper Inventory Management and Unsafe Consumption of APIs. We test all ten categories in every API security assessment.
- Can you test GraphQL APIs?
- Yes. GraphQL introduces specific attack surfaces including introspection disclosure, query depth attacks, batching abuse, field-level authorization bypass and alias-based rate limit evasion. GraphQL APIs require specialized tooling and methodology that differs from REST testing.
- How do you test API authentication security?
- We test OAuth 2.0 flows, JWT token validation (signature verification, algorithm confusion, claim manipulation), API key security, bearer token scope and session management. We verify that authentication is enforced consistently across all endpoints including undocumented and deprecated routes.
- What is BOLA and why is it the number one API vulnerability?
- BOLA (Broken Object Level Authorization) occurs when an API accepts an object identifier without verifying the requesting user has permission to access that resource. An attacker changes a resource ID and accesses another user's data. It is common, easy to exploit and nearly impossible for automated scanners to detect. Manual testing is the only reliable way to find BOLA flaws.