Chinmay Pandyachinmaypandya.hashnode.dev·May 16, 2024Secure Your APIs (Part 1) : Leakage and ProxyingAPI Leakage Everybody uses APIs in their applications but did you know that your API request might contain sensitive information which you might not wanna share with others, such as API keys/tokens. API keys/tokens are a way in which you can authoriz...Discuss·35 readsAPIs
Nainaznainaz.hashnode.dev·Dec 5, 2023Loopback API proxyWhat is a loopback service? It receives the request from the client, processes it, and responds without calling the backend service. Any modifications to the response can be done inside the proxy. The loopback service can also be used as a dummy b...DiscussApigeeapigee
Dipak kumar Dasblog.d1pakda5.com·Aug 16, 2022How I Found SSRF In Choreo's REST API ProxySo one night I was looking for some external bug bounty programs. Then I found WSO2 Security Reward and Acknowledgement Program. Within the scope of the program was a product called Choreo. So Choreo is a digital innovation platform that allows you t...Discuss·1 like·275 readsbugbounty
Udaysinhknowthatstuff.hashnode.dev·Jul 25, 2022Forward Proxy, Reverse Proxy and API ProxyWhat is a proxy server? Proxy service means act on behalf of another machine. Proxy server is a system or router that provides gateway between users and internet. It helps prevent cyber attackers from entering a private network. What is a forward pro...Discuss·28 readsproxy