Illicit Consent Grant
An attack technique where adversaries register malicious OAuth applications that request excessive permissions, then trick users into authorizing them.
An attack technique where adversaries register malicious OAuth applications that request excessive permissions, then trick users into authorizing them.