Idor Vulnerability Testing

🌐Community
by sickn33 · vlatest · Repository

Identifies potential IDOR vulnerabilities by systematically probing resource access based on predictable identifiers.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add idor-vulnerability-testing npx -- -y @trustedskills/idor-vulnerability-testing
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "idor-vulnerability-testing": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/idor-vulnerability-testing"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill enables AI agents to systematically identify Insecure Direct Object Reference (IDOR) vulnerabilities within web applications. It automates the process of manipulating object identifiers in URLs or request parameters to verify if unauthorized users can access resources belonging to other accounts.

When to use it

  • During security assessments of APIs that rely on user IDs, order numbers, or transaction codes for resource access.
  • When auditing authentication bypass risks where session tokens or primary keys are exposed in query strings.
  • To validate whether an application properly enforces authorization checks alongside its authentication mechanisms.
  • As part of a broader penetration testing workflow to uncover data leakage before production deployment.

Key capabilities

  • Automatically generates test requests with modified object identifiers (e.g., changing user_id=101 to user_id=102).
  • Compares responses to detect if the application returns sensitive data for non-owned resources.
  • Reports findings on potential unauthorized access vectors across various HTTP methods and endpoints.

Example prompts

  • "Test this API endpoint for IDOR vulnerabilities by swapping user IDs in the request parameters."
  • "Scan the provided login page URL for insecure direct object references that could expose private profiles."
  • "Simulate an attack where I modify order numbers to see if I can view other customers' purchase history."

Tips & gotchas

Ensure you have explicit authorization before testing any live environment, as IDOR scans may trigger false positives or unintended access attempts. This skill is most effective when combined with manual verification of business logic flaws that automated tools might miss.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
sickn33
Installs
177

🌐 Community

Passed automated security scans.