Attack Results
Toggle security controls and run attacks to see which ones succeed or fail.
Blocked
Succeeded
Ready to Test
Configure security controls on the left, then click "Run All Attacks" to see how your configuration holds up against common OAuth vulnerabilities.