FOLLOW FLUID ATTACKS
The application triggers logging events exclusively from the front-end.
This could be used by an attacker to disrupt the traceability of their actions
by dropping the logging requests.
R075. Record exceptional events in logs
R320. Avoid client-side control enforcement
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.