-
Notifications
You must be signed in to change notification settings - Fork 0
Examples
Matthew A. Davis edited this page May 8, 2026
·
1 revision
AttackMap uses small example applications to validate scanner behavior and show believable output.
This example is designed to demonstrate:
- a public webhook attack surface
- secret-like environment usage
- a direct database interaction
- an outbound integration
Expected themes in output:
- webhook findings
- route-to-database risk
- third-party integration trust boundary
This example is designed to demonstrate:
- an auth boundary
- a privileged admin route
- direct database access from routes
- outbound audit or service calls
Expected themes in output:
- admin route exposure
- authentication boundary risk
- input-to-database abuse
attackmap examples/webhook-billing-demo
attackmap examples/flask-admin-demo- small enough to read in a minute or two
- uses realistic framework patterns
- clearly exposes one or two important trust boundaries
- triggers meaningful findings and at least a couple of attack paths
- Express app with weak auth middleware
- FastAPI app with nested routers and admin routes
- upload flow with risky parser behavior
- background job or webhook chain into a datastore
Migrated from https://gitlab.com/matthewd.xyzAI/AttackMap/-/wikis/Examples.