Chained IDOR + auth bypass
Predictable resource IDs combined with weak session validation enabling cross-tenant data access in payments APIs.
Threat library
A growing catalogue of real vulnerabilities discovered across recent Sentryx engagements — sanitised, categorised, and mapped to defensive controls.
Predictable resource IDs combined with weak session validation enabling cross-tenant data access in payments APIs.
Single-source price feeds in lending vaults allow attackers to drain liquidity within one transaction.
Over-broad iam:PassRole on Lambda execution roles letting low-priv users assume admin paths.
Missing CSRF protection on social login callbacks enabling account takeover via crafted redirects.
Unvalidated deeplink intents triggering authenticated actions without user confirmation.
Build logs and cached layers leaking API keys despite secret-scanning at commit time.
Subscribe to the Threat Brief or request a tailored briefing for your stack.
Request briefing