VAPT • 6 min read
VAPT Checklist: Web + API Testing That Finds Real Risk
Most testing fails because it stops at “scanner findings”. This checklist is designed to catch what attackers actually exploit: weak auth flows, broken access control, and abuse paths.
Updated: Feb 24, 2026 • Author: Cyber Spear Team • Category: VAPT
1) Authentication & Session Security
- ✓Brute-force controlsRate limits, lockout policies, and MFA enforcement.
- ✓Token rotationRotate tokens on login, privilege change, and password reset.
- ✓Password reset abuseVerify OTP/email flows cannot be bypassed or enumerated.
2) Authorization (Broken Access Control)
- ✓IDOR checksChange IDs and validate server-side ownership checks exist.
- ✓Role boundary testsEnsure non-admin users cannot access admin routes.
- ✓Tenant isolationValidate cross-tenant access is blocked in multi-tenant apps.
3) API Abuse & Business Logic
- ✓Mass assignmentEnsure payload fields can’t modify restricted properties.
- ✓Replay / race conditionsDouble spend, duplicate orders, and promo abuse scenarios.
- ✓Improper object stateAccess drafts, cancel paid flows, or reuse one-time actions.
4) Remediation & Retesting
Good VAPT ends with closure: fixes verified, regressions prevented, and guardrails added.
NEXT STEP
Want us to run this checklist on your app?
We’ll deliver proof-based findings, priority fixes, and retesting support.