Scenario: A user changes order_id in a URL and sees another user’s order. What is the core failure?
webScenario: You are threat modelling a login flow. Under STRIDE 'Repudiation', what is the key concern?
threat-modelsScenario: You add security logging. What makes a log 'useful' for detection?
detectionScenario: A password reset endpoint reveals whether an email exists. What risk is this?
webScenario: An endpoint checks authentication but not authorisation. What is the predictable failure?
identityScenario: You identify a threat but cannot justify a control. What is missing?
threat-modelsWhich logging practice is most defensible?
detectionScenario: A support agent can see admin-only pages by changing a client-side flag. What is the root issue?
webScenario: You suspect brute force on login. What is the first detection signal you want?
detectionScenario: An API uses long-lived API keys. What is the biggest security risk?
identityScenario: A team says 'we're safe because we use HTTPS'. What is the best response?
threat-modelsScenario: A file upload allows .html and is served from the same domain. What is a likely risk?
web