``
Louis Okperiruisi
Cybersecurity Analyst | SOC | API Security | AI Security
This project demonstrates practical API security assessment using industry-standard tools to identify, analyze, and remediate vulnerabilities in real-world API environments.
The assessment was conducted using:
- Qualys TotalAppSec
- Aikido Security Platform
- Wallarm API Security
Target APIs were sourced from:
API Security University Tools & Resources
- Perform API vulnerability scanning
- Identify security weaknesses
- Analyze risks and impacts
- Recommend remediation strategies
- Improve API security posture
- Qualys – Web and API vulnerability scanning
- Aikido – API security monitoring and issue analysis
- Wallarm – API threat detection and vulnerability analysis
- Postman Collections – API testing and target setup
- Different responses were observed based on user-agent behavior
- Potential exposure to:
- Cross-Site Scripting (XSS)
- SQL Injection
- Authorization bypass
Recommendation
- Enforce consistent validation and security controls across all user-agents
- Apply strict input validation and output sanitization
- Potential man-in-the-middle (MITM) attack vector
- Weak TLS session handling identified
Recommendation
- Enable TLS secure renegotiation
- Enforce TLS 1.2 / TLS 1.3 only
- No
X-RateLimit-*headers found - Risk of API abuse and denial-of-service behavior
Impact
- Poor API usage control
- Higher risk of HTTP 429-related failures
- Weak visibility for clients consuming the API
Recommendation
- Implement rate limiting using:
- API Gateway such as NGINX, Kong, or AWS API Gateway
- Middleware such as FastAPI + slowapi
- Add standard headers:
X-RateLimit-LimitX-RateLimit-RemainingX-RateLimit-Reset
- Improper configuration exposed internal resources
- Sensitive components and interfaces were accessible
Recommendation
- Secure deployment configurations
- Restrict unnecessary endpoints and exposed services
- Apply proper access control and patch vulnerable components
| Tool | Strength | Key Finding |
|---|---|---|
| Qualys | Deep vulnerability scanning | TLS and endpoint inconsistencies |
| Aikido | Developer-focused issue analysis | Missing rate limits and browser security gaps |
| Wallarm | API threat detection | Security misconfiguration and vulnerable components |
- API Security Testing
- Vulnerability Assessment
- Risk Analysis
- Security Tool Integration
- Findings Documentation
- Security Recommendations and Reporting
api-security-lab/
├── README.md
├── reports/
│ ├── qualys-report.md
│ ├── aikido-report.md
│ └── wallarm-report.md
├── findings/
│ └── key-findings.md
├── screenshots/
│ ├── aikido/
│ │ ├── dashboard.png
│ │ ├── findings-summary.png
│ │ ├── issue-details.png
│ │ └── vulnerabilities.png
│ ├── qualys/
│ │ ├── api-target.png
│ │ ├── detections.png
│ │ ├── findings-summary.png
│ │ └── scan-setup.png
│ └── wallarm/
│ ├── dashboard.png
│ ├── findings-summary.png
│ ├── issue-details.png
│ └── vulnerabilities.png











