Idor Vulnerability Testing
Identifies and exploits IDOR vulnerabilities in web applications using automated techniques and Davila7's specialized methodology.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add davila7-idor-vulnerability-testing npx -- -y @trustedskills/davila7-idor-vulnerability-testing
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"davila7-idor-vulnerability-testing": {
"command": "npx",
"args": [
"-y",
"@trustedskills/davila7-idor-vulnerability-testing"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to automatically detect Insecure Direct Object Reference (IDOR) vulnerabilities by analyzing application logic and API endpoints. It systematically attempts unauthorized access to resources by manipulating object identifiers to expose sensitive data or functionality.
When to use it
- Penetration testing web applications with RESTful APIs or dynamic resource loading.
- Validating access controls on user-specific data like invoices, messages, or account settings.
- Auditing systems where direct database IDs (e.g., UUIDs, integers) are exposed in URLs or parameters.
- Complementing automated scanners to verify business logic flaws that tools often miss.
Key capabilities
- Identifies endpoints vulnerable to IDOR attacks through parameter manipulation.
- Tests unauthorized access by substituting object identifiers with those belonging to other users.
- Analyzes application responses to confirm if sensitive data is exposed without proper authentication checks.
- Generates reports detailing specific vulnerable paths and potential impact.
Example prompts
- "Scan this API for IDOR vulnerabilities by testing access to user profile endpoints with different user IDs."
- "Analyze the provided codebase to find direct object references that lack authorization checks."
- "Simulate an IDOR attack on the
/api/v1/invoicesendpoint to see if I can view another user's invoice data."
Tips & gotchas
Ensure you have explicit permission and legal authorization before testing any system, as IDOR scanning involves active exploitation attempts. Focus testing only on environments you own or have written consent to audit to avoid service disruptions or legal issues.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.