Vulnsy
API27 items

API Security Testing Checklist

A detailed checklist for testing the security of REST and GraphQL APIs. Covers authentication, authorization, input validation, rate limiting, and data exposure risks aligned with the OWASP API Security Top 10.

OWASP API Security Top 10NIST SP 800-115PTES
Progress: 0 of 27 items
0%
Commands
kr scan https://api.target.com -w routes-large.kite -A=apiroutes-220828
ffuf -u https://api.target.com/FUZZ -w /usr/share/seclists/Discovery/Web-Content/api/api-endpoints.txt -mc 200,201,401,403
Commands
curl -X OPTIONS -i https://api.target.com/v1/users
Commands
curl -X POST https://api.target.com/graphql -H "Content-Type: application/json" -d '{"query":"{__schema{types{name}}}"}'
Evidence to capture

two paired API requests showing User A's token returning User B's record (with redacted PII), including the raw HTTP requests and responses.

Evidence to capture

request with a low-privilege token successfully invoking an administrative endpoint, showing both the raw request and the privileged response payload.

Commands
jwt_tool eyJhbGciOi... -T
jwt_tool eyJhbGciOi... -X a -pc role -pv admin
Evidence to capture

request body containing an unexpected field (e.g. `"role":"admin"`) plus the response demonstrating that the field was accepted and persisted.

Evidence to capture

scripted iteration enumerating other users' records via the BOLA flaw, with a sample of the extracted payloads (PII redacted).

Commands
curl -I -H "Origin: https://evil.com" https://api.target.com/v1/users

Industries Using This Checklist

Report Vulnerabilities Faster with Vulnsy

Stop rewriting the same findings. Use Vulnsy's reusable templates, collaborative workflows, and professional report generation to deliver pentest reports 10x faster.

Start Free Trial