FOLLOW FLUID ATTACKS
The application triggers logging events exclusively from the front-end.
This could be used by an attacker to disrupt the traceability of his actions
by dropping the logging requests.
R075. Record exceptional events in logs
R320. Avoid client-side control enforcement
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.