• Agents
  • Pricing
  • Blog
Log in
Get started

Security for apps built with AI. Paste a URL, get a report, fix what matters.

Product

  • How it works
  • What we find
  • Pricing
  • Agents
  • MCP Server
  • CLI
  • GitHub Action

Resources

  • Guides
  • Blog
  • Docs
  • OWASP Top 10
  • Glossary
  • FAQ

Security

  • Supabase Security
  • Next.js Security
  • Lovable Security
  • Cursor Security
  • Bolt Security

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Imprint
© 2026 Flowpatrol. All rights reserved.
OWASP API Security Top 10 · 2023

Ten patterns.
Sixty seconds each.

Ten vulnerability patterns that appear consistently across REST, GraphQL, and AI-generated API endpoints. Maintained by OWASP and used by security teams worldwide as the baseline for API review.

Web Top 10LLM Top 10API Top 10
API1

Your API trusts the ID in the request

Broken Object Level Authorization

The number one API bug: endpoints that hand out any object to anyone who asks for it by ID.

Read the story
API2

The login endpoint anyone can brute force

Broken Authentication

Auth that works for the happy path and quietly falls over the moment anyone pokes at it.

Read the story
API3

The API returns fields you never meant to send

Broken Object Property Level Authorization

When your GET endpoint leaks admin flags and your PATCH endpoint lets users write them.

Read the story
API4

The endpoint that will happily DoS your wallet

Unrestricted Resource Consumption

Every route has a price tag — CPU, memory, database rows, LLM tokens, SMS messages. Most are uncapped.

Read the story
API5

The admin endpoints that forgot they were admin endpoints

Broken Function Level Authorization

When the frontend hides the admin button but the backend still answers the request.

Read the story
API6

The flow that works the same for one user and ten thousand bots

Unrestricted Access to Sensitive Business Flows

The endpoint works perfectly. A script that calls it 50,000 times works perfectly too.

Read the story
API7

The 'I'll fetch any URL you give me' bug

Server Side Request Forgery

You asked for a link preview feature. You shipped a way for attackers to read the cloud metadata endpoint.

Read the story
API8

The defaults nobody read

Security Misconfiguration

CORS set to '*'. An admin endpoint with no auth. A management port open to the internet. All three in one deploy.

Read the story
API9

The old version of the API that nobody turned off

Improper Inventory Management

/api/v1 still works. It has the bug you fixed six months ago in /api/v2.

Read the story
API10

Trusting the other API because you like the company that runs it

Unsafe Consumption of APIs

Your code validates user input and then trusts the JSON from a third-party API like it came from God.

Read the story

Scan for all ten.

Flowpatrol tests every category on this list — and proves every finding with a real exploit. Paste a URL, get a report in minutes.

Try it freeWhat we find