This resource is no longer available
The reliance on pointers and how APIs operate make it difficult for a developer using a web app vulnerability scanner to find all the possible end points (and possible attack vectors) for testing.
Luckily, API documentation addresses this glaring security hole.
Explore API specification framework security best practices and find the right solution for your API strategy.