Blog Collection

Essays on trust, risk, and security language.

Focused writing on questionnaires, third-party risk, compliance decisions, and the wording that shapes real security work.

Back home
Explore Articles

Filter the archive by theme, or jump straight into the strongest recent analysis.

Rating Limit Bypass via Request Manipulation
GRCApr 28, 2026

Rating Limit Bypass via Request Manipulation

I discovered a business logic flaw in a web application’s rating system that allowed submission of values beyond the intended limit of 5. By intercepting the request using Burp Suite and modifying the rating parameter, I was able to submit values outside the accepted range. This was my first successful bug bounty finding, and it was acknowledged and rewarded by the program.

Read essay ->