Findings

Response violates schema

Updated: June 19, 2025

Description

Severity: High

The response body does not conform to the specified schema.

Proper schema validation is crucial to ensuring that data exchanged between systems remains consistent and secure.

Example Attack

Injection Attacks: If an API or application fails to validate incoming data against the expected schema, attackers could potentially inject malicious content that the system may improperly process or execute. This can lead to various security vulnerabilities such as SQL injection, XML injection, or NoSQL injection.

Remediation

Use tooling to ensure that response payloads are validated and sanitized against the API specification.

Previous (Findings - Action based findings)
Response timeout
Next (Findings - Action based findings)
Server error