SAMMY UI is optimized for resolutions with a width 1024px and higher.
V15.3.1
V15.3.1: Verify that the application only returns the required subset of fields from a data object. For example, it should not return an entire data object, as some individual fields should not be accessible to users.
ASVS Maturity
V15.3.2
V15.3.2: Verify that where the application backend makes calls to external URLs, it is configured to not follow redirects unless it is intended functionality.
ASVS Maturity
V15.3.3
V15.3.3: Verify that the application has countermeasures to protect against mass assignment attacks by limiting allowed fields per controller and action, e.g., it is not possible to insert or update a field value when it was not intended to be part of that action.
ASVS Maturity
V15.3.4
V15.3.4: Verify that all proxying and middleware components transfer the user's original IP address correctly using trusted data fields that cannot be manipulated by the end user, and the application and web server use this correct value for logging and security decisions such as rate limiting, taking into account that even the original IP address may not be reliable due to dynamic IPs, VPNs, or corporate firewalls.
ASVS Maturity
V15.3.5
V15.3.5: Verify that the application explicitly ensures that variables are of the correct type and performs strict equality and comparator operations. This is to avoid type juggling or type confusion vulnerabilities caused by the application code making an assumption about a variable type.
ASVS Maturity
V15.3.6
V15.3.6: Verify that JavaScript code is written in a way that prevents prototype pollution, for example, by using Set() or Map() instead of object literals.
ASVS Maturity
V15.3.7
V15.3.7: Verify that the application has defenses against HTTP parameter pollution attacks, particularly if the application framework makes no distinction about the source of request parameters (query string, body parameters, cookies, or header fields).
ASVS Maturity