Misconfigured GraphQL implementations can allow for attackers to bypass authorization and access internal APIs. These "secondary context attacks" exploit the gap between GraphQL&
The @trickest [https://twitter.com/trick3st] Inventory project
[https://github.com/trickest/inventory] is an interesting resource. It has a
massive set of hostnames, live