Common API Vulnerabilities Checks
Number of APIs: 2
About this collection
This collection will check your APIs for the following things:
Security Vulnerabilities
Security Headers
Content Secure Policy
Using the collection
Step 1: Define the following Variables in the Check for Common API Vulnerabilities as a collection variable.
- API's base URL you want to test in the
base_url
variable - Suspicious or Foreign Origin for which you want to test in
malicious_origin
variable - Add unauthorised subdomain URL in the
sub_domain_url
variable - Key name that will contain the access token in
access_token_key
variable, default isx-access-token
- Valid access token to access the API in
valid_access_token_value
variable - Expired access token in
expired_access_token_value
variable - Other User's valid access token in
other_user_access_token_value
variable - The key that is used to send user id OR name in the
param_key
variable - The value in the
param_value
variable for the key mentioned in theparam_key
Step 2: Once configured, run the collection within the Runner
with the relevant environment selected.
Step 3: View the test results. Failed tests could mean that the API is vulnerable to an attack. Check out the Visualize
tab to learn more about the test results.
-
Security Headers - Check for Security Headers GET {{base_url}}
-
Authentication - Check response with other users access token GET {{base_url}}