Documentation
  • ๐ŸปIntro
    • Why API Security is Critical?
    • Pynt at a Glance
    • Who Should Use Pynt?
  • ๐Ÿ‘ฉโ€๐Ÿ’ปAPI Security Testing
    • Security Testing Overview
    • Prerequisites for Running Pynt Scans
    • How to Install Pynt CLI
    • How to install Pynt Binary (Linux only)
    • Pynt CLI Modes
      • ๐Ÿ”ตPynt Command CLI Mode
      • ๐Ÿ”ตPynt Listen CLI Mode
    • Pynt Security Tests Coverage
      • Business Logic Tests
      • Injection Tests
      • Authentication Bypass Tests
      • Mass Assignment Tests
      • Server-Side Request Forgery Tests
      • Stack Trace In Response
      • Lack of Resources and Rate Limiting
      • File Path Manipulation
      • GraphQL Introspection Vulnerability
      • GraphQL Alias Overloading
      • LLM APIs Vulnerabilities
      • Insecure Transport Scheme
      • Basic Authentication
      • HTTP Desynchronization (Desync) Attack
    • Sensitive Data Exposure Detection
    • Pynt Scans Troubleshooting
      • Pynt CLI Troubleshooting
      • Pynt for Postman Troubleshooting
        • Troubleshoot Pynt Container not Running Error
        • Troubleshoot Empty API Key Error
        • Troubleshoot Unauthorized API Key Error
        • Troubleshoot Collection Not Found Error
        • Troubleshoot Non-Unique Collection Name Error
        • Troubleshoot Empty Collection Identifier Error
        • Troubleshoot Unreachable Target Error
        • Troubleshoot Target Responds with Errors Error
        • Troubleshoot Unresolved Target Domain Error
        • Troubleshoot Unresolved Variable Error
        • Troubleshoot TLS Handshake Fail Error
        • Troubleshoot Few Requests Error
        • Troubleshoot One User Only Error
        • Troubleshoot Failed Assertions Error
    • How To
      • How to Run Business Logic Tests with Pynt
      • How to associate a Pynt scan to an Application in Pynt Dashboard
      • How to tag a scan in Pynt
    • Benchmarks
      • Pynt vs OWASP crAPI
  • ๐ŸคฒSecurity Testing Integrations
    • ๐ŸŸ Pynt with API Testing Tools
      • ๐Ÿ”˜Pynt for Postman
        • Fork Pynt Collection
        • Run Pynt Container
        • Run Pynt in Postman
        • View Scan Results in Postman
      • ๐Ÿ”˜Pynt for Insomnia
      • ๐Ÿ”˜Pynt for ReadyAPI
    • ๐ŸŸ Pynt with API Testing CLIs
      • ๐Ÿ”˜Pynt for Newman (Postman CLI)
      • ๐Ÿ”˜Pynt for TestRunner (ReadyAPI CLI)
    • ๐ŸŸ Pynt with Testing Frameworks
      • ๐Ÿ”˜Pynt for .NET (xUnit)
      • ๐Ÿ”˜Pynt for Selenium
      • ๐Ÿ”˜Pynt for Rest Assured
      • ๐Ÿ”˜Pynt for Jest
      • ๐Ÿ”˜Pynt for pytest
      • ๐Ÿ”˜Pynt for Go
      • ๐Ÿ”˜Pynt for JMeter
    • ๐ŸŸ Pynt on CI/CD
      • โ—How to get Pynt ID for CI/CD Authentication
      • ๐Ÿ”˜Pynt for GitHub Actions
      • ๐Ÿ”˜Pynt for Azure DevOps Pipelines
      • ๐Ÿ”˜Pynt for GitLab
      • ๐Ÿ”˜Pynt for Jenkins
    • ๐ŸŸ Pynt with Burp Suite
    • ๐ŸŸ Pynt with Browsers
      • ๐Ÿ”˜Pynt for Firefox Browser
    • ๐ŸŸ Live Traffic Connectors
      • ๐Ÿ”˜eBPF
        • ๐Ÿ”˜Key Components
      • ๐Ÿ”˜Traffic Mirroring
    • ๐ŸŸ Advanced Pynt Examples
      • ๐Ÿ”˜Pynt as a Standalone Container
      • ๐Ÿ”˜Pynt with Prerecorded Har Files
      • ๐Ÿ”˜Pynt with cURL
  • ๐ŸˆธApplications View
    • Application View Overview
    • Manage Applications
      • Add Application
      • Delete Application
      • Rename Application
    • Manage Sources for API Discovery
      • Add Source
      • Delete Source
      • View Source Info
      • Source Categories
        • API Documentation
          • Swagger
          • Postman Collection
        • API Gateways
          • AWS API Gateway
          • Azure API Gateway
          • Kong API Gateway
          • GCP API Gateway
          • Gravitee API Gateway
        • Testing (API Security Scans)
        • Live Traffic
          • Data Collection with eBPF
          • ALB Traffic Capture with AWS Traffic Mirroring
        • Code Repository
    • Application Dashboard
    • Generate Pentest Report
  • ๐Ÿ“šAPI Catalog
    • API Catalog Overview
    • Navigate API Catalog
      • Filtering API Catalog by Application
      • API Catalog Customization
      • API Related Info
      • APIs at Risk
    • Manage API Source Gaps
      • New APIs
      • Untested APIs
      • Shadow APIs
      • Undocumented APIs
    • View Detailed Endpoint Info
  • โชScan History
    • Scan History Overview
    • Navigate Scan History
      • Associating Scans with Specific Application
      • Filtering by Application
      • Scan Related Info
      • Scan History Customization
    • View Detailed Scan Info
    • Associate Vulnerabilities to Tickets with JIRA
  • Account Management
    • Single Sign-On (SSO)
      • Setting up Okta
      • Setting up Entra ID
Powered by GitBook
On this page
  • Pynt Security Tests Coverage - Introduction
  • Pynt Test Cases
  1. API Security Testing

Pynt Security Tests Coverage

The following page describe the updated security test coverage by Pynt

PreviousPynt Listen CLI ModeNextBusiness Logic Tests

Last updated 6 months ago

At a Glance: ๐Ÿ” Pynt offers comprehensive API security testing by leveraging real-world attack simulations and homegrown tests. It addresses key risks highlighted in the OWASP Top 10 while continuously enhancing its security scope.

Pynt Security Tests Coverage - Introduction

Pynt's security tests cover a wide range of vulnerabilities using real-world attack simulations and homegrown attack scenarios, ensuring robust API security. These tests align with:

  • : Tackling API-specific risks like broken authentication and data exposure.

  • : Covering general web vulnerabilities such as injection attacks.

  • : Addressing emerging threats in large language models.

Pynt goes beyond the OWASP Top 10, offering homegrown tests that identify gaps often missed by standard tools. These unique tests bolster your API's security by providing extra protection against potential threats. Learn more at , for detailed insights.


Pynt continuously evolves to provide maximum security coverage. Pynt integrates seamlessly into your CI/CD pipeline, ensuring high accuracy and minimal false positives while safeguarding critical endpoints.

Pynt Test Cases

๐Ÿ› ๏ธ Note: This list might be partial as it grows rapidly, so stay updated for expanded coverage!

Test case
Category

Business Logic

Business Logic

Business Logic

Business Logic

Business Logic

Business Logic

Business Logic

Business Logic

Business Logic

Injections

Injections

Injections

Injections

Injections

Injections

Injections

Injections

Authentication bypass

Authentication bypass

Authentication bypass

Authentication bypass

Authentication bypass

Mass Assignment

Mass Assignment

Server-Side request forgery

Stack trace in response

Lack of Resources and Rate Limiting

File path manipulation

GraphQL introspection Vulnerability

GraphQL Alias Overloading

LLM APIs Vulnerabilities

LLM APIs Vulnerabilities

LLM APIs Vulnerabilities

LLM APIs Vulnerabilities

LLM APIs Vulnerabilities

Insecure transport scheme

Basic Authentication

User data leakage to other users - Resource-ID authorization

User data leakage to other users - User-ID authorization

User data leakage to other users - Resource-ID and User-ID authorization

User data leakage to other users - credentials authorization

User data manipulation by other users - Resource-ID authorization

User data manipulation by other users - User-ID authorization

User data manipulation by other users - Resource-ID and User-ID authorization

User data manipulation by other users - credentials authorization

Guessable resource identifier

SQL Injection

MS-SQL Injection

MySQL Injection

SQLite Injection

PostgreSQL Injection

NoSQL Injection

Command Injection

Server-side template injection

Ignored authentication token

No signature validation in JWT

JWT hashed without secret

No signature in JWT

Unsigned JWT

Mass assignment by manipulation of hidden attributes

Mass assignment by flag overloading

Local file access

Stack trace in response

Resources limiting

File path manipulation

GraphQL introspection

[ GraphQL Alias Overloading

Direct prompt injection

Prompt injection, alignment

LLM Insecure output handling, type: XSS

LLM Insecure output handling, type: SSRF

LLM Insecure output handling, type: Markdown

Insecure transport scheme

Basic Authentication

๐Ÿ‘ฉโ€๐Ÿ’ป
OWASP Top 10 for APIs
OWASP Top 10 for Web Applications
OWASP Top 10 for LLMs
Pynt vs OWASP: Pyntโ€™s Top-10 Focus
[BL001]
[BL002]
[BL003]
[BL004]
[BL005]
[BL006]
[BL007]
[BL008]
[BL009]
[INJ001]
[INJ002]
[INJ003]
[INJ004]
[INJ005]
[INJ006]
[INJ007]
[INJ008]
[AB001]
[AB002]
[AB003]
[AB004]
[AB005]
[MA001]
[MA002]
[SSRF001]
[ST001]
[RES001]
[FM001]
[GQL001]
GQL002]
[LLM001]
[LLM002]
[LLM003]
[LLM004]
[LLM005]
[TLS001]
[AB006]