-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inquiry Regarding Vulnerability Report and Authentication Error Handling in OFFAT #144
Comments
Hi Akshay, Thanks for using the tool and It's nice that you found it useful. Currently, we're migrating it to golang to enhance it's performance and refactor code. We'll consider your feedback while implementing it in golang. |
Thank you for your response. I noticed that the tool isn't scanning for all OWASP Top 10 API issues. Could you please explain why that might be? |
Both the tools are currently WIP. Python version will be deprecated soon and only golang version will be maintained. Hopefully, we'll add all the new checks soon. Also, it might be worth noting that It'll be difficult to implement all the checks in generalized way because developers usually write APIs in different ways, so each APIs might behave differently as there's no common standard being used by teams universally. |
Thanks for the update, @dmdhrumilmistry! Understood that the Python version will be deprecated and only the Go version will be maintained. Looking forward to the new checks as they get added. I agree that implementing all checks in a generalized way is challenging due to the lack of a universal API standard. Appreciate the effort you’re putting into this! Additionally, I’m facing a few issues:
Would appreciate any insights on these!" |
Dear Support Team,
I hope this email finds you well.
I’m currently using your tool, OFFAT, for API security testing, and I’ve been very pleased with its performance overall. It’s an effective tool that suits my needs quite well. However, I do have some concerns regarding the vulnerability report it generates.
Specifically, when I run a scan using either a correct bearer token or an incorrect one, the resulting report appears identical in both cases. As a result, I’m having difficulty distinguishing between a valid scan and one based on an incorrect token. Additionally, the tool doesn’t seem to provide any error message when authentication fails.
I understand that OFFAT still performs checks for authentication bypass even when credentials are incorrect, but it would be greatly beneficial if the tool could provide an error message, similar to the one shown when a file is unavailable, whenever there’s an issue with the bearer token or another authentication failure during a scan.
Any insights or guidance you can provide on this would be greatly appreciated. Thank you for your attention to this matter, and I look forward to your response.
Best regards,
Akshay.
The text was updated successfully, but these errors were encountered: