Logo
Noddev
ShowcaseDocsBlog
Go to Docs

Welcome

IntroductionEcosystem Overview

Omni (OSINT Platform)

OverviewCore ConceptsSteganographySocial Recon

ApiShield (Security)

Getting StartedRate LimitingThreat Models

Terminal-RichJS (CLI)

IntroductionInstallationComponentsLayouts

Ready to secure your next project?

GitHub Profile

© 2026 NODDEV. All rights reserved.

GitHubTwitterWhatsApp

Threat Models & Security Audit

Security vulnerabilities and threat modeling in ApiShield.

This document covers the security audit findings for ApiShield, including identified vulnerabilities and their risk assessments.

Vulnerability Summary

Risk LevelIssueDescriptionLocation
MediumReDoSGlob-to-regex conversion for path ignoring can be exploited with malicious patternslib/config.js
Low/InfoSSRFscanLiveURL fetches arbitrary user-provided URLslib/parsers/live.js
LowIncomplete Auth DetectionStatic parsers only look for standard headers like Authorization or X-API-Keylib/parsers/har.js, postman.js

ReDoS (Regex Denial of Service)

Risk Level: Medium

The glob-to-regex conversion used for path ignoring can be exploited with carefully crafted malicious patterns. This could cause the scanner to hang when processing untrusted configuration input.

Mitigation: Replace manual regex generation with a robust library like minimatch.

SSRF (Server-Side Request Forgery)

Risk Level: Low/Info

The scanLiveURL function in lib/parsers/live.js fetches arbitrary user-provided URLs. In a hosted environment, this could be abused to probe internal networks.

Mitigation: Implement URL allowlisting and/or SSRF protection middleware for hosted deployments.

Incomplete Auth Detection

Risk Level: Low

Static parsers only detect standard authorization headers (Authorization, X-API-Key). Custom authentication schemes may be missed in the security analysis.

Mitigation: Allow user-configurable header patterns for auth detection.

STRIDE Mapping

ApiShield maps findings to the STRIDE threat model:

  • Spoofing - Authentication weaknesses
  • Tampering - Input validation issues
  • Repudiation - Logging gaps
  • Information Disclosure - Sensitive data exposure
  • Denial of Service - Rate limiting vulnerabilities
  • Elevation of Privilege - Authorization flaws

OWASP API Top 10 Coverage

The threat model reporter also maps findings to the OWASP API Security Top 10, providing actionable security insights aligned with industry standards.

PreviousRate LimitingNextIntroduction
Was this helpful?

On This Page

Vulnerability SummaryReDoS (Regex Denial of Service)SSRF (Server-Side Request Forgery)Incomplete Auth DetectionSTRIDE MappingOWASP API Top 10 Coverage