Idor Vulnerability Testing
Identifies potential IDOR vulnerabilities by systematically probing resource access based on predictable identifiers.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add idor-vulnerability-testing npx -- -y @trustedskills/idor-vulnerability-testing
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"idor-vulnerability-testing": {
"command": "npx",
"args": [
"-y",
"@trustedskills/idor-vulnerability-testing"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to systematically identify Insecure Direct Object Reference (IDOR) vulnerabilities within web applications. It automates the process of manipulating object identifiers in URLs or request parameters to verify if unauthorized users can access resources belonging to other accounts.
When to use it
- During security assessments of APIs that rely on user IDs, order numbers, or transaction codes for resource access.
- When auditing authentication bypass risks where session tokens or primary keys are exposed in query strings.
- To validate whether an application properly enforces authorization checks alongside its authentication mechanisms.
- As part of a broader penetration testing workflow to uncover data leakage before production deployment.
Key capabilities
- Automatically generates test requests with modified object identifiers (e.g., changing
user_id=101touser_id=102). - Compares responses to detect if the application returns sensitive data for non-owned resources.
- Reports findings on potential unauthorized access vectors across various HTTP methods and endpoints.
Example prompts
- "Test this API endpoint for IDOR vulnerabilities by swapping user IDs in the request parameters."
- "Scan the provided login page URL for insecure direct object references that could expose private profiles."
- "Simulate an attack where I modify order numbers to see if I can view other customers' purchase history."
Tips & gotchas
Ensure you have explicit authorization before testing any live environment, as IDOR scans may trigger false positives or unintended access attempts. This skill is most effective when combined with manual verification of business logic flaws that automated tools might miss.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.