mitm-find-idor
Find IDOR Vulnerabilities
Analyze the mitmproxy dump (log.txt) for IDOR vulnerabilities for: $ARGUMENTS
Requires:
log.txtin the current directory. If it's missing, capture traffic first:mitmdump --set flow_detail=3 2>&1 | tee log.txt
High-Value IDOR Patterns (from 132 real HackerOne bounty reports)
1. User/Account Object References
user_id, userId, user-id, uid, account_id, accountId
customer_id, customerId, member_id, memberId
profile_id, owner_id, creator_id, author_id
Real example: https://zomato.com/gold/payment-success?subscription_id=XXX&user_id=YYY
More from instavm/security-skills
mitm-find-auth
Find authentication and session vulnerabilities. Use when user asks about auth bypass, session issues, login security, or token problems.
16mitm-find-otp
Find OTP implementation vulnerabilities. Use when user asks about OTP security, verification bypass, SMS security, or two-factor authentication issues.
15mitm-find-checksum
Find checksum and signature vulnerabilities. Use when user asks about hash validation, signature bypass, checksum manipulation, or cryptographic weaknesses.
15mitm-find-bizlogic
Find Business Logic vulnerabilities in captured traffic. Use when user asks about payment bypass, race conditions, workflow abuse, or application logic flaws.
15mitm-find-pii
Find PII (Personally Identifiable Information) leakage in API responses. Use when user asks about data exposure, privacy issues, or sensitive data in traffic.
14mitm-find-ssrf
Find SSRF (Server-Side Request Forgery) vulnerabilities in captured traffic. Use when user asks about URL fetching, webhooks, integrations, or internal network access.
13