By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Free Autoswagger Tool Finds the API Flaws Attackers Hope You Miss
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Free Autoswagger Tool Finds the API Flaws Attackers Hope You Miss
Tech News

Free Autoswagger Tool Finds the API Flaws Attackers Hope You Miss

By admin 7 Min Read
Share
SHARE

Contents
APIs: Still Easy Targets in 2025What is Autoswagger and How Does it Work?Broken Authorization in Action: Four Real API Vulnerabilities Found by AutoswaggerAutomated Documentation = Attack Surface RiskAbout the author:

APIs: Still Easy Targets in 2025

APIs are the backbone of modern applications – and one of the most exposed parts of an organization’s infrastructure. This makes them a prime target for attackers.

One of the highest-profile examples was the Optus breach in 2022, where attackers stole millions of customer records through an unauthenticated API endpoint – costing the telecom company $140 million AUD in fallout.

Worryingly, vulnerabilities like this are so easy to exploit you could teach someone with no technical background to do it in a day. And three years on, Intruder’s security team is still finding the same issues in the APIs of major organizations – including members of the S&P 500.

That’s why we built Autoswagger – a free, open-source tool that scans APIs for broken authorization flaws. Read on to see how it works and some of the most surprising issues it uncovered when we put it to the test.

What is Autoswagger and How Does it Work?

Autoswagger scans domains to detect exposed API documentation – like OpenAPI or Swagger schemas – then parses them to generate a list of endpoints to test. It sends requests using valid parameters from the documentation and flags any endpoint that returns data without proper access control (i.e. no 401 or 403).

If a response includes sensitive data – like credentials or personally identifiable information (PII) – and the endpoint isn’t properly secured, it gets flagged in the output.

Autoswagger tool

Autoswagger is free to download and install via GitHub.

For more advanced testing, Autoswagger can be run with the –brute flag to attempt to bypass validation checks. This helps uncover flaws in endpoints that reject generic input but accept specific data formats or values.

APIs are one of the easiest ways into systems – and attackers know it.

Thousands of teams trust Intruder’s always-on exposure management platform to secure their apps and APIs and fix critical issues before attackers find them. Upload your API schema and get peace of mind in minutes.

Start Free Trial

Broken Authorization in Action: Four Real API Vulnerabilities Found by Autoswagger

We put Autoswagger to the test on targets from several large Bug Bounty programs, scanning for vulnerable APIs at scale.

Here are a few real-world examples to show you what broken authorization looks like in the wild.

Microsoft MPN Credentials

One vulnerability we found was in an endpoint simply named ‘config’, which exposed credentials and API keys for Microsoft Partner Program data stores. Among the data exposed was a valid set of credentials for a Redis database containing the PII of the partners, including the courses and certifications they had undertaken.

The vulnerable endpoint was buried six layers deep (/1/dashboard/mpn/program/api/config/), making it nearly impossible to guess or discover through brute-force –  it was only identified because the API’s OpenAPI schema was exposed.

60,000+ Salesforce Records

Another case involved an API connected to a Salesforce instance at a large tech company. The API returned customer records – including names, contact details, and product orders – which could be extracted in bulk by incrementing the ‘ByDate’ url parameter to retrieve 1,000 records per request.

SQL Access on Internal Training App

We also found an internal staff training API at a well-known soda company, running in Azure Functions, that allowed unauthenticated users to run arbitrary SQL queries against the database.

While the data was limited to internal training records, it included staff names and email addresses – the kind of detail an attacker could use to craft a convincing phishing campaign.

Azure Functions APIs don’t normally expose documentation, but a developer had deployed an extension that did. While this may have been for another service to consume, there was no clear reason for it to be publicly accessible since the app was meant for internal use.

Active Directory (AD) Enumeration (Octopus Deploy)

Finally, Autoswagger discovered CVE-2025-0589, which allowed an unauthenticated attacker to enumerate Active Directory user information if AD was integrated with the Octopus Deploy server.

Automated Documentation = Attack Surface Risk

Automated API documentation is great for developers – but just as useful for attackers. When an API’s schema is exposed, it gives them a clear map of every endpoint to target. Without that map, most wouldn’t even bother – fuzzing endpoints blindly takes far more effort.

Hiding documentation isn’t a substitute for proper API vulnerability management, but publicly exposing docs you don’t need is an unnecessary risk. Most of the vulnerabilities we found were in APIs never meant to be public – yet their documentation was exposed anyway.

Take a look at your own environment: if your internal APIs are documented and exposed to the internet, they might be handing attackers everything they need.

Intruder continuously scans API endpoints to detect a wide range of vulnerabilities, including exposed documentation.

Check your APIs today by starting a free 14-day trial.

About the author:

Daniel Andrew, Head of Security Services, Intruder

Daniel Andrew heads up offensive security at Intruder, where he leads Intruder’s Private Bug Bounty team. His background is as a CREST-certified penetration tester and .NET software engineer.

Sponsored and written by Intruder.

You Might Also Like

Using Self-Checking Loops GPT-5.2 Hits 75% on ARC-AGI

Surplus Wind End Energy Poverty Alan Wylie of EnergyCloud

What Is a Preamp, and Do I Really Need One?

Your guide to complete visibility

How do you dispose of old batteries? Derry Cronin, Business Development Director of EHS International

TAGGED: API, Autoswagger, Cybersecurity, Intruder, Scanner, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Ninja Gaiden 4, The Outer Worlds 2 Deluxe Editions on Xbox Series X/S Might Have Game Data on Disc
Next Article The Best Smart Rings, Tested and Reviewed (2025)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Using Self-Checking Loops GPT-5.2 Hits 75% on ARC-AGI
Tech News
2026 Fed cuts will be ‘key catalyst’ for retail's return to crypto
Crypto
One Year Later: Remembering Dragon Age: The Veilguard’s Mess
Gaming News
Man Utd 1-1 Wolves: Gary Neville slams "bizarre" Ruben Amorim decision
Sports
Live – Channel Tunnel partially reopens but Eurostar still advises passengers to delay travel
Travel
Here’s The XRP Fractal That Says Price Is Headed To $27
Crypto
Surplus Wind End Energy Poverty Alan Wylie of EnergyCloud
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Using Self-Checking Loops GPT-5.2 Hits 75% on ARC-AGI

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Using Self-Checking Loops GPT-5.2 Hits 75% on ARC-AGI
December 31, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?