Tenant isolation failures
Broken object-level authorization and IDOR flaws that let one customer read, modify, or delete another's data. The most common critical finding in SaaS pentests. Affects APIs, background jobs, file storage, and cached query results.
API authorization gaps
Broken function-level authorization, mass assignment, and missing ownership checks on REST and GraphQL endpoints. Internal service-to-service APIs are frequently undertested and overtrusted.
Authentication bypass
SSO misconfigurations, OAuth2 redirect_uri manipulation, SAML signature wrapping, JWT algorithm confusion, SCIM provisioning abuse. Enterprise SSO is complex and the attack surface grows with each IdP integration.
Subscription tier escalation
Business logic flaws that let users access features, storage, seats, or API rate limits above their paid tier. Often exploitable through parameter manipulation or by directly calling plan-gated API endpoints.
Integration and webhook abuse
SSRF through third-party integration endpoints, unsigned or weakly signed webhook delivery, credential leakage in incoming event payloads, and replay attacks against idempotency keys.
CI/CD and secrets exposure
Hardcoded API keys in git history, overly permissive GitHub Actions workflows, deployment credentials with excessive blast radius, and publicly accessible build artifacts.