What Issues Can Aikido Pentest Find?
OWASP Top 10 & Critical Risks
We cover the full OWASP Top 10, prioritizing the high-impact issues that actually cause data breaches.
BOLA / IDOR (Cross-Tenant Data Leakage)
Broken Object Level Authorization and Insecure Direct Object References. We verify that User A cannot access User B’s private data (e.g., changing an ID in an API call).
Broken Access Control
Privilege escalation (vertical) and unauthorized access to admin functions.
Injection Flaws
Classic SQL Injection (SQLi) and Database Injection flaws.
Command Injection / Remote Code Execution (RCE)
Detecting if untrusted data executes system commands or OS directives.
Cross-Site Scripting (XSS)
Comprehensive scanning for stored and reflected XSS.
Authentication Failures
Weak password policies, credential stuffing, cookie integrity issues, absence of rate limiting and session management failures.
Server-Side Request Forgery (SSRF)
Tricking the server into making requests to internal resources or external systems.
Advanced & Niche Attack Vectors
Beyond the basics, we probe for complex vulnerabilities that often slip through standard scanners.
LLM & Prompt Injection
Securing AI integrations against manipulation. We detect prompt injection, jailbreaking, and attempts to leak system context.
Business Logic Errors
Flaws in application workflows that allow bypasses (e.g., skipping payment steps) and complex input validation errors.
Exotic Injections
NoSQLi, LDAP Injection, XPath Injection, and Server-Side Template Injection (SSTI).
Files & Misconfigurations
Scanning for file system risks including Local File Inclusion (LFI), Unrestricted File Uploads, Directory Listing, and Error Leakage.
Insecure Deserialization
Executing malicious code by manipulating serialized objects.
Web Cache Poisoning
Manipulating caching mechanisms to serve harmful content to other users.
Client-Side Attacks
Cross-Site Scripting (XSS), CSRF, Open Redirects, and DOM-based vulnerabilities.
Cryptographic Failures
Use of broken algorithms, weak signatures (JWT), hard-coded credentials, and sensitive data exposure.
Compliance
Running this pentest satisfies technical controls for SOC 2 Type II, ISO 27001, and HIPAA. You get a detailed report ready for auditors.
Last updated
Was this helpful?