You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: address CI lint and textlint errors in Feature Flag test case
Changes:
- Fix MD029: Use consistent ordered list prefixes (1. instead of 1/2/3)
- Fix MD012: Remove extra blank line at end of file
- Fix textlint: Change "back-end" to "backend" (4 occurrences)
- Fix textlint: Change "local storage" to "localStorage" (3 occurrences)
- Fix broken link: Update LaunchDarkly docs URL
Signed-off-by: Ahmed Adel Bakr Alderai <bakr.alderai@gmail.com>
Copy file name to clipboardExpand all lines: document/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/15-Test_for_Feature_Flag_Security_Bypass.md
+16-17Lines changed: 16 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Feature flags (also known as feature toggles, feature switches, or feature gates
11
11
Common security issues with feature flags include:
12
12
13
13
-**Client-side manipulation**: Flags evaluated in the browser can be modified by attackers to enable restricted features.
14
-
-**Authorization bypass**: Hidden UI elements may still have accessible back-end endpoints.
14
+
-**Authorization bypass**: Hidden UI elements may still have accessible backend endpoints.
15
15
-**Information disclosure**: Flag configurations may leak unreleased features or internal logic.
16
16
-**Insecure defaults**: Fallback values when the flag service is unavailable may fail open.
17
17
-**Stale flag vulnerabilities**: Unused flags referencing deprecated code paths may contain unpatched vulnerabilities.
@@ -22,7 +22,7 @@ Modern applications increasingly rely on feature flag services (LaunchDarkly, Sp
22
22
23
23
- Identify feature flags that gate security-relevant functionality.
24
24
- Assess whether feature flag states can be manipulated client-side.
25
-
- Verify that back-end authorization is independent of flag state.
25
+
- Verify that backend authorization is independent of flag state.
26
26
- Determine if flag configurations expose sensitive information.
27
27
- Evaluate fail-safe behavior when the flag service is unavailable.
28
28
@@ -44,7 +44,7 @@ splitio
44
44
flagsmith
45
45
```
46
46
47
-
2.**Monitor network traffic** for requests to feature flag endpoints:
47
+
1.**Monitor network traffic** for requests to feature flag endpoints:
48
48
49
49
```http
50
50
GET /api/features HTTP/1.1
@@ -62,7 +62,7 @@ Content-Type: application/json
62
62
}
63
63
```
64
64
65
-
3.**Examine local storage and cookies** for cached flag values.
65
+
1.**Examine localStorage and cookies** for cached flag values.
66
66
67
67
### Test Client-Side Flag Manipulation
68
68
@@ -78,7 +78,7 @@ Attempt to modify flag values to enable restricted features:
78
78
{"admin_mode": true}
79
79
```
80
80
81
-
2.**Modify local storage**: If flags are cached client-side, change the values directly.
81
+
1.**Modify localStorage**: If flags are cached client-side, change the values directly.
0 commit comments