FOLLOW FLUID ATTACKS
It is possible to modify fields that are invisible to the regular user and
cause undesired behaviors in the application.
R173. Discard unsafe inputs
R320. Avoid client-side control enforcement
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.