Your API Has Authorization Bugs. Hadrian Finds Them.
好的,我现在要帮用户总结这篇文章的内容。首先,我需要仔细阅读文章,了解Hadrian是什么。文章开头提到Hadrian是一个开源的API授权测试框架,由Praetorian开发。它能自动检测BOLA和BFLA等授权漏洞,支持REST、GraphQL和gRPC APIs。 接下来,文章详细说明了Hadrian检测的漏洞类型,包括OWASP API安全十大中的几种,并且支持自定义模板。然后比较了Hadrian与Autorize和AuthMatrix的不同之处,指出Hadrian的优势在于直接读取API规范,自动生成角色组合,并且支持更多协议。 接着,文章提到Hadrian支持GraphQL和gRPC,并且针对每个协议设计了特定的漏洞模板。还介绍了三阶段变异测试法,确保写入和删除漏洞确实成功。最后提到Hadrian可以集成到CI/CD管道中,并提供了多种运行选项。 现在我要把这些信息浓缩到100字以内。首先确定核心要点:Hadrian是开源框架,用于API授权测试;检测OWASP十大漏洞;支持多种协议;使用三阶段测试;适合集成到CI/CD。 接下来,组织语言确保流畅简洁。注意不要使用“这篇文章”这样的开头,直接描述内容。 </think> Hadrian 是一个开源的 API 授权测试框架,用于自动化检测 BOLA、BFLA 等授权漏洞。它支持 REST、GraphQL 和 gRPC 协议,并通过三阶段变异测试验证漏洞有效性。框架内置 OWASP API 安全十大模板并支持自定义扩展,适合集成到 CI/CD 管道中进行持续安全测试。 2026-3-27 13:0:0 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Hadrian is an open-source API authorization testing framework built by Praetorian. It automates the detection of authorization vulnerabilities like BOLA (Broken Object Level Authorization) and BFLA (Broken Function Level Authorization) across REST, GraphQL, and gRPC APIs using role-based permutation testing and YAML-driven security templates.

Hadrian ships with 30 built-in security templates covering the OWASP API Security Top 10, including Broken Object Level Authorization (API1:2023), Broken Authentication (API2:2023), Broken Object Property Level Authorization (API3:2023), Broken Function Level Authorization (API5:2023), and excessive data exposure. Custom templates can be added for application-specific logic.

Autorize and AuthMatrix are Burp Suite extensions that require manual browsing or configuration. Autorize only tests endpoints you visit during your session, and AuthMatrix requires manually configuring a matrix of roles and endpoints. Hadrian reads the API specification directly, generates every attacker-victim role permutation automatically, and supports GraphQL and gRPC in addition to REST. It also uses three-phase mutation testing to prove write/delete vulnerabilities actually succeeded.

Yes. Hadrian supports REST (via OpenAPI specs), GraphQL (via introspection or SDL schema), and gRPC (via proto files) under a unified testing framework. Each protocol gets vulnerability templates designed for its specific attack surface, including GraphQL-specific checks like query depth attacks, batching abuse, and circular fragment exploitation.

Mutation testing is Hadrian’s method for proving that write and delete vulnerabilities actually succeeded. Phase 1 (Setup) creates a resource as the victim. Phase 2 (Attack) attempts to modify or delete that resource as the attacker. Phase 3 (Verify) checks whether the resource was actually changed. This eliminates false positives from APIs that return 200 OK without actually performing the unauthorized action.

Hadrian can be imported as a Go module and run programmatically, making it suitable for CI/CD integration. It also supports --dry-run for scoping, --proxy for routing through Burp Suite, and adaptive rate limiting to avoid triggering WAF blocks during automated testing. All output is structured for easy parsing and integration with existing security workflows.


文章来源: https://securityboulevard.com/2026/03/your-api-has-authorization-bugs-hadrian-finds-them/
如有侵权请联系:admin#unsafe.sh