Exchange
Go to assets list

OWASP API Security Top 10 2019 Checklist

Top 10 API Security Risks checklist maintained by the OWASP API Security Project
  • Ruleset
  • Anypoint Platform
  • Updated last year
    January 2, 2024 at 6:53 PM
Log into Anypoint Platform to download this asset

MuleSoft Organization published 2 years ago
November 29, 2022 at 2:12 PM
    Latest1.1.0
    Stable
    Collapse


    Pages
    Home
    Go to page broken-object-level-authorization-use-guids
    Go to page excessive-data-exposure-mandatory-schema
    Go to page lack-of-resources-and-rate-limiting-too-many-requests
    Go to page injection-pattern-on-string-parameters
    Go to page improper-assets-management-environment-info
    Go to page improper-assets-management-version
    Go to page broken-user-authentication-use-tls
    Go to page broken-user-authentication-authenticate-api

    improper-assets-management-version

    general > improper-assets-management-version


    Guidance

    The purpose of an API host is unclear, and there are no explicit answers to the following questions:
    - Which API version is running?

    Applies to WebAPI

    Constraint

    Type: Declarative Validation