Authorization & object access
How does the system really decide who can touch what? Analysis includes broken object-level and function-level authorization, role boundaries, and multi-tenant isolation failures.
- BOLA / IDOR and access-control flaws
- Cross-tenant data exposure risks
- Role boundaries enforced (or not) by the backend