Skip to content

Commit

Permalink
Changed ACL to permission
Browse files Browse the repository at this point in the history
  • Loading branch information
adamshostack authored Jun 25, 2019
1 parent 1963514 commit 63b5768
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion cards.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ suits:
7: An attacker can bypass permissions because you don't make names canonical before checking access permissions
8: An attacker can manipulate data because there's no integrity protection for data on the network
9: An attacker can provide or control state information
10: An attacker can alter information in a data store because it has weak ACLs or includes a group which is equivalent to everyone ("anyone with a Facebook account")
10: An attacker can alter information in a data store because it has weak/open permissions or includes a group which is equivalent to everyone ("anyone with a Facebook account")
J: An attacker can write to some resource because permissions are granted to the world or there are no ACLs
Q: An attacker can change parameters over a trust boundary and after validation (for example, important parameters in a hidden field in HTML, or passing a pointer to critical memory)
K: An attacker can load code inside your process via an extension point
Expand Down

0 comments on commit 63b5768

Please sign in to comment.