FOLLOW FLUID ATTACKS
It is possible to modify fields that are invisible to the regular user and
cause undesired behaviors in the application.
R173. Discard unsafe inputs
R320. Avoid client-side control enforcement
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.