Authentication & Authorization Review
Activation Triggers (Positive)
authsessiontokenmfaidorbolabflaprivilege escalationtenant isolation
Exclusion Triggers (Negative)
recon onlyinjection fuzzing onlywrite report only
Output Schema
- Access-control matrix:
actor,resource,action,expected,observed - Session/token lifecycle findings:
issued,replayed,revoked,result - Confirmed boundary breaks with attacker capability statement
Instructions
- Define identity roles and expected permissions before testing.
- Validate both horizontal and vertical boundaries with paired-role comparisons.
- Test session and token invalidation across interfaces and time windows.
- Confirm authorization at object, function, and workflow levels.
- Distinguish authentication weakness from authorization weakness in output.
- Escalate only confirmed boundary failures into exploit chaining.
Should Do
- Use explicit role-to-action test cases.
- Capture full evidence for accepted and denied control paths.
- Verify revocation behavior, not just issuance behavior.
Should Not Do
- Do not infer access-control findings from UI behavior alone.
- Do not conflate missing data with denied access.
- Do not mark privilege escalation without deterministic proof of crossed boundary.