Open arjun-akto opened 11 months ago
Hi @arjun-akto I would like to work on this kindly assign it to me.
assign to me
Hi @newton0-0 , @ishanpatil35 . I have assigned the issue to you. Please feel free to connect us on our Discord server for any doubts.
Hi @arjun-akto , can you please assign this issue to me too?
Hi @arjun-akto , i would like to work on this , can you please assign it to me.
Hi @Nayansagar1326 , @adarsh-jha-dev. I have assigned the issue to you. Please feel free to connect us on our Discord server for any doubts. Sorry for the late reply!
Hey @arjun-akto I would like to work on this issue
Hi @parthrc ! I have assigned the issue to you. Please feel free to connect us on our Discord server for any doubts. Sorry for the late reply!
Hey @arjun-akto , I have raised a PR for this issue, I request you to please have a look at it and let me know if the changes are relevant.
Hi @adarsh-jha-dev Please fill out this form here so we can send you Akto swags. Will let you know ETA of swags soon, thanks for your contribution! 🚀
Hi @adarsh-jha-dev Please fill out this form here so we can send you Akto swags. Will let you know ETA of swags soon, thanks for your contribution! 🚀
Thanks a lot, but this form is asking for permission of the owner. Could you please resolve this?
Hi @adarsh-jha-dev, we've received your details, swags should reach you in a month!
💭 Introduction:
We want a test to check whether an attacker can create/update entity with Host Header Manipulation
🎯 Requirements:
Filters - API with GET query parameter or JSON body parameter
Execute - It should add or replace a value with
Validation - If the application responds with a exception trace or error response strings, it is a vulnerability.
✅ Task summary:
📚 Reading
You can find a detailed documentation of test editor rules [here]
Find 100+ examples of YAML tests [here]
🙋🏼♂️ Questions:
If you have questions, need any help, or just want to hang out, make sure to join us on our [Discord server].