Attack Results

Toggle security controls and run attacks to see which ones succeed or fail.

Blocked Succeeded

Ready to Test

Configure security controls on the left, then click "Run All Attacks" to see how your configuration holds up against common OAuth vulnerabilities.