API Security Testing Checklist
A detailed checklist for testing the security of REST and GraphQL APIs. Covers authentication, authorization, input validation, rate limiting, and data exposure risks aligned with the OWASP API Security Top 10.
kr scan https://api.target.com -w routes-large.kite -A=apiroutes-220828ffuf -u https://api.target.com/FUZZ -w /usr/share/seclists/Discovery/Web-Content/api/api-endpoints.txt -mc 200,201,401,403curl -X OPTIONS -i https://api.target.com/v1/userscurl -X POST https://api.target.com/graphql -H "Content-Type: application/json" -d '{"query":"{__schema{types{name}}}"}'two paired API requests showing User A's token returning User B's record (with redacted PII), including the raw HTTP requests and responses.
request with a low-privilege token successfully invoking an administrative endpoint, showing both the raw request and the privileged response payload.
jwt_tool eyJhbGciOi... -Tjwt_tool eyJhbGciOi... -X a -pc role -pv adminrequest body containing an unexpected field (e.g. `"role":"admin"`) plus the response demonstrating that the field was accepted and persisted.
scripted iteration enumerating other users' records via the BOLA flaw, with a sample of the extracted payloads (PII redacted).
nosqlmapcurl -I -H "Origin: https://evil.com" https://api.target.com/v1/users