OWASP Top 10 – Missing Function Level Access Control

  • URL Tampering
  • parameter modification


  • verification of request on server-side
  • no hard-coded entitlements
  • Principle of least privileges

What's on your mind?

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.