API Security
GameAnalyze API request/response pairs and identify the security vulnerability.
🔌
How to play
1.5 API scenarios — each shows a request and response
2.Identify the OWASP API security vulnerability
3.30s per round — 160 pts each
4.Cover: missing auth, IDOR, data exposure, mass assignment, rate limits