-
Notifications
You must be signed in to change notification settings - Fork 4.4k
Description
What is the proposed Cheat Sheet about?
This Cheat Sheet will provide practical guidance for identifying and preventing workflow and state-transition abuse in modern applications. It focuses on architectural attack paths where attackers exploit legitimate API sequences, state desynchronization, and feature lifecycle changes rather than traditional vulnerabilities.
What security issues are commonly encountered related to this area?
-Out-of-order API execution enabling unauthorized actions
-State desynchronization between frontend and backend services
-Token reuse across workflow boundaries
-Feature flag and kill-switch security regression
-Orphaned backend capabilities after UI redesigns
-Microservice authorization drift across deployment cycles
What is the objective of the Cheat Sheet?
The objective is to provide developers, architects, and security professionals with a consolidated set of patterns, prevention techniques, and testing strategies to detect and eliminate workflow abuse and state-transition vulnerabilities that are not addressed by traditional vulnerability scanners.
What other resources exist in this area?
OWASP Top 10, WSTG, and the API Security Top 10 discuss broken access control and business logic flaws, but none provide dedicated prevention guidance for architectural workflow abuse and security regression introduced by feature flags or distributed state transitions.
This content complements existing projects rather than duplicating them and would not be suitable as a testing guide section because it focuses on prevention and design patterns rather than exploitation techniques.