Threat Risk Assessment

For Developers

Data Access Risk

Could this give an attacker access to data they shouldn't see? (Think: user info, payment data, internal business data, API keys, passwords, etc.)

System Modification Risk

Could an attacker use this to change code, databases, configurations, or third-party services you use?

Audit Trail Risk

Could this allow changes happen without appearing in logs, version control, or monitoring systems?

Service Disruption Risk

Could exploitation of this cause damage that requires rebuilding, restoring from backups, or manual intervention to fix?

Authentication Bypass

Can someone exploit this without logging in or having an account?

Privilege Requirements

Does the attacker need to be a system admin, database admin, or have elevated permissions?

Attack Vector

Could this issue be exploited work over the web/API, or does someone need to be on your local network?

Exploit Complexity

Can someone exploit this with standard hacking tools, or do they need to code something from scratch?

Special Conditions

Can this only be exploited under specific circumstances (certain configs, timing, user actions, etc.)?

Dependencies

Does this require compromising databases, APIs, or other services before it can be exploited?