VulnAPIDocumentationDocumentationVulnerabilitiesVulnerabilitiesLabsLabs
GitHubGitHub (opens in a new tab) (opens in a new tab)
  • Introduction
  • Getting Started
    • Installation
    • GitHub Action
  • Vulnerabilities
      • JWT None Algorithm
      • JWT Blank Secret
      • JWT Cross Service Relay Attack
      • JWT Null Signature
      • JWT Weak Secret
      • Brute Force Attack
      • GraphQL Introspection Enabled
      • HTTP Method Override Enabled
      • Tls
  • Best Practices
    • API Security Headers

On This Page

  • Resources
Documentation
Best Practices
JWT Best Practices

JWT Best Practices

Resources

  • IETF JSON Web Token Best Current Practices (opens in a new tab)
Best Practices

MIT 2025 © CerberAuth.