Security
▾
Vulnerabilities
Prompt Injection
BOLA / IDOR
Auth Bypass
JWT Misconfiguration
SSRF
Data Exposure
Rate Limiting
Mass Assignment
GraphQL Attacks
View all 60+
Frameworks
FastAPI
Express
Spring Boot
Django
NestJS
Rails
Laravel
Gin
ASP.NET
View all 30+
LLM Security
OpenAI
Anthropic
Google Gemini
Mistral
Meta Llama
LangChain
LlamaIndex
View all 15+
By Industry
Fintech
Healthcare
SaaS
IoT
By Protocol
REST
GraphQL
gRPC
WebSocket
CWE Database
CWE-89: SQL Injection
CWE-79: XSS
CWE-287: Auth Bypass
CWE-200: Data Exposure
CWE-918: SSRF
CWE-502: Deserialization
View all 200+
Attack Techniques
Credential Stuffing
JWT Cracking
Prompt Injection
SSRF Metadata
IDOR Enumeration
View all 40+
Scan Your API Now — Free
Compliance
▾
Standards
OWASP API Top 10
PCI-DSS
HIPAA
SOC 2
GDPR
ISO 27001
NIST
CIS
Popular Checks
OWASP: Auth Bypass
PCI-DSS: Data Exposure
HIPAA: PII Leakage
SOC 2: Encryption
GDPR: Data Protection
Regulations
▾
Regional Regulations
GDPR (EU)
CCPA (California)
LGPD (Brazil)
PSD2 (EU)
DORA (EU)
NIS2 (EU)
PIPL (China)
CMMC (US DoD)
FedRAMP (US)
View all 20+
Standards
OWASP API Top 10
PCI-DSS
HIPAA
SOC 2
GDPR
ISO 27001
NIST
CIS
Pricing
Docs
EN
▾
EN
ES
PT
DE
FR
Get Started
Security
Protocols
BY PROTOCOL
API Security by Protocol
Protocol-specific vulnerabilities, attack vectors, and security best practices.
5 Protocols
Graphql API Security
Grpc API Security
Rest API Security
Soap API Security
Websocket API Security
Scan Your APIs Now
Learn how it works