SiteShadow
Back to vulnerability library

M01 Missing Authentication

What this means

SiteShadow flagged a route/handler that appears to perform a sensitive action or return sensitive data without requiring a logged-in user (or a trusted service identity).

Why it matters

Safer examples

1) Add an auth guard/middleware

app.get("/account", requireAuth, async (req, res) => {
  res.json(await getAccount(req.user.id));
});

2) Separate public vs. private routes

3) Return 401/403 consistently

Avoid "soft auth" patterns that return partial data when user is missing.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage