# What Issues Can Aikido Pentest Find?

## OWASP Top 10 & Critical Risks

We cover the full OWASP Top 10, prioritizing the high-impact issues that actually cause data breaches.

* **BOLA / IDOR (Cross-Tenant Data Leakage)**
  * Broken Object Level Authorization and Insecure Direct Object References. We verify that User A cannot access User B’s private data (e.g., changing an ID in an API call).
* **Broken Access Control**
  * Privilege escalation (vertical) and unauthorized access to admin functions.
* **Injection Flaws**
  * Classic SQL Injection (SQLi) and Database Injection flaws.
* **Command Injection / Remote Code Execution (RCE)**
  * Detecting if untrusted data executes system commands or OS directives.
* **Cross-Site Scripting (XSS)**
  * Comprehensive scanning for stored and reflected XSS.
* **Authentication Failures**
  * Weak password policies, credential stuffing, cookie integrity issues, absence of rate limiting and session management failures.
* **Server-Side Request Forgery (SSRF)**
  * Tricking the server into making requests to internal resources or external systems.

## Advanced & Niche Attack Vectors

Beyond the basics, we probe for complex vulnerabilities that often slip through standard scanners.

* **LLM & Prompt Injection**
  * Securing AI integrations against manipulation. We detect prompt injection, jailbreaking, and attempts to leak system context.
* **Business Logic Errors**
  * Flaws in application workflows that allow bypasses (e.g., skipping payment steps) and complex input validation errors.
* **Exotic Injections**
  * NoSQLi, LDAP Injection, XPath Injection, and Server-Side Template Injection (SSTI).
* **Files & Misconfigurations**
  * Scanning for file system risks including Local File Inclusion (LFI), Unrestricted File Uploads, Directory Listing, and Error Leakage.
* **Insecure Deserialization**
  * Executing malicious code by manipulating serialized objects.
* **Web Cache Poisoning**
  * Manipulating caching mechanisms to serve harmful content to other users.
* **Client-Side Attacks**
  * Cross-Site Scripting (XSS), CSRF, Open Redirects, and DOM-based vulnerabilities.
* **Cryptographic Failures**
  * Use of broken algorithms, weak signatures (JWT), hard-coded credentials, and sensitive data exposure.

## Compliance

Running this pentest satisfies technical controls for **SOC 2 Type II, ISO 27001, and HIPAA**. You get a detailed report ready for auditors.
