Perform comprehensive attack surface mapping by correlating three data sources: external network scans, authenticated browser exploration, and source code analysis. Produces a structured endpoint inventory with authorization metadata, role/privilege architecture, and prioritized authorization vulnerability candidates for downstream code review and exploitation.
| API Endpoint Inventory | Table: method, path, authrequired, rolesallowed, validationsummary, file:line | | Network Interaction Map | External services, internal services, exposed ports, subdomain inventory | | Role & Privilege Architecture | Role hierarchy, permission matrix, privilege escalation paths |
| Authorization Vulnerability Candidates | Prioritized list of endpoints with suspected authz gaps | | Session Architecture | Token type, storage, rotation, expiry, invalidation behavior |
Сопоставление поверхностей атак методом «белого ящика» — сопоставьте внешнее сканирование, исследование браузера и исходный код со структурированным инвентарем конечных точек, ролевой архитектурой и кандидатами на уязвимости авторизации. Источник: jd-opensource/joysafeter.