Hacksplaining
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance
Sign Up
Log In
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance Sign Up Log In

Broken Access Control

However, this attitude is considered security through obscurity, and is best avoided. Even if the path to sensitive data is practically unguessable (say, you are using UUIDs), once a path is discovered it can be widely shared.

Lessons
Glossary
Terms and Conditions
Privacy Policy

© 2026 Hacksplaining Inc. All rights reserved. Questions? Email us at support@hacksplaining.com