ARION
Digital Presence & Branding
SPARK
Marketing & Growth Systems
OLIVER
Operations, Admin & Execution
STELLA
Data Intelligence & Analytics
FORGE
Custom Apps & Integrations
ARGUS
Automation & Orchestration
SPARK — Marketing & Growth Systems
Turn contacts into loyal customers with automated, data-driven marketing.
FORGE — Custom Apps & Integrations
Build exactly what your business needs, connected to every tool you use.
ARGUS — Automation & Orchestration
The intelligence layer connecting every platform, automatically.
One login. One data model. Six platforms. Zero app-switching. Explore the full ecosystem →
Build Your Brand
Presence, Visibility & Growth
Build Your Foundation
Operations, Process & Workflows
Build Your Clarity
Reporting, KPIs & Data Strategy
Build Your Engine
Integrations, Automation & Tech
HomeSignal › The Security Audit That Found 23 Vulnerabilities in Our Production API

The Security Audit That Found 23 Vulnerabilities in Our Production API

Alex Kim··1 min read·4 views
Signal
APIAWSZero Trust

We’d been shipping software for four years without a formal security audit. Our internal security practices were reasonable — we didn’t store plain-text passwords, we used parameterized queries, we kept dependencies updated. We also had 23 vulnerabilities in production, ranging from informational to critical.

The Most Common Finding Category: Authorization Logic

Nine of our 23 findings were authorization-related. Not authentication — we had reasonable authentication. Authorization: checking not just that a user is logged in, but that they’re allowed to perform the specific action they’re requesting on the specific resource they’re targeting. Object-level authorization failures (accessing other users’ data by manipulating IDs) are consistently the most common API vulnerability in modern applications.

IDOR: The Finding That Embarrassed Us Most

We had three Insecure Direct Object Reference vulnerabilities — APIs where authenticated users could access other users’ data by changing a numeric ID in the request. These are straightforward to exploit and straightforward to prevent. We had them because we’d never thought to test for them. We now include IDOR tests in our standard API test suite for every resource endpoint.

The Process Change That Mattered Most

Beyond fixing the specific findings, the most valuable outcome was building security review into our development process. Security as a gate before deployment rather than a check after launch catches the category of issue that external audits find most commonly: authorization logic that’s correct for the happy path but broken for edge cases.

Alex Kim
Alex Kim
Software architect specializing in distributed systems and microservices.

Related Posts