Broken object-level authorization
The #1 API risk. We enumerate IDs, switch tenants, escalate roles, and test every endpoint that takes a record reference.
REST and GraphQL APIs tested manually for the patterns scanners miss: broken object-level authorization, mass assignment, batched query abuse, business-logic flaws, schema introspection leaks, rate-limit bypass.
Coverage maps to OWASP API Security Top 10 (2023) plus GraphQL-specific patterns.
The #1 API risk. We enumerate IDs, switch tenants, escalate roles, and test every endpoint that takes a record reference.
Token issuance, JWT verification, key rotation, refresh-token reuse, API key entropy, multi-step auth flows.
Mass assignment, attribute-based escalation, hidden fields, partial-update abuse.
Rate limiting at endpoint level, GraphQL query depth/complexity limits, batched mutation abuse, DoS via expensive operations.
Workflow bypass, replay, race conditions in multi-step business operations.
In API endpoints that fetch URLs (webhook handlers, image processors, integrations). Cloud metadata, internal-service abuse.
Schema-aware testing where possible (OpenAPI, GraphQL introspection), black-box otherwise. We work the auth model end-to-end.
API pentest deliverables.
Reproducible curl/Burp requests for every finding. Server response captured. Severity per CVSS 4.0.
Which categories tested, which surfaced findings, which were clean.
For multi-tenant APIs: cross-tenant attempts attempted, blocked, and any leak paths found.
Post-fix retest included. Findings re-verified, attestation letter delivered.
Common triggers for an API pentest.
You are about to publish API docs and let third parties hit your endpoints. Verify auth, rate limits, and BOLA before they do.
A partner integration relies on your API. Their security team is asking what testing you have done.
Moved from REST to GraphQL (or about to). New attack surface — depth limits, batched queries, introspection.
Auditor expects API surface to be covered by the pentest. Generic web app coverage is not enough.
Common questions for this engagement type. See main pentest FAQ for shared questions.
OpenAPI speeds up surface mapping but is not required. We can map endpoints from client traffic, intercepting Postman collections, or HAR exports.
Yes. Introspection exposure, depth and complexity limits, batched mutation abuse, persisted-query bypass. We cover these on top of the standard OWASP API Top 10.
Both. Most APIs have public endpoints (health, version, login). We test those first, then move to authenticated surface with provided test credentials.
Free 30-minute scoping call. We will review your API surface (OpenAPI/schema, sample requests) and quote a fixed-fee engagement.