{"id":253757,"date":"2025-08-13T14:29:24","date_gmt":"2025-08-13T12:29:24","guid":{"rendered":"https:\/\/cyberforces.com\/?p=253757"},"modified":"2025-08-13T14:29:24","modified_gmt":"2025-08-13T12:29:24","slug":"application-security-audit","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/application-security-audit","title":{"rendered":"Application Security Audit"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Web and mobile applications have become the backbone of business operations in nearly every industry. They process personal data, handle payments, support logistics processes, and facilitate communication with clients. However, they are also attractive targets for cybercriminals. Even a small vulnerability can lead to significant losses. An application security audit helps identify these weaknesses before they can be exploited by attackers.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>In this article, you&#8217;ll learn:<\/h2>\n<ul>\n<li>What an application security audit is and when it should be conducted<\/li>\n<li>The most common threats in web and mobile applications<\/li>\n<li>How an audit differs from penetration testing and what the report looks like<\/li>\n<li>How audits help meet regulatory requirements such as GDPR and NIS2<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Table of Contents:<\/h2>\n<ol>\n<li>What is an application security audit and when is it needed?<\/li>\n<li>The stages of an application audit \u2013 how does the process work?<\/li>\n<li>The most common vulnerabilities found during an audit<\/li>\n<li>Application audit vs penetration testing \u2013 similarities and differences<\/li>\n<li>Audits and compliance with GDPR, ISO 27001, NIS2<\/li>\n<li>What does an application audit report include?<\/li>\n<li>FAQ \u2013 frequently asked questions<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>What is an Application Security Audit and When is it Needed?<\/h2>\n<p>An application security audit is a detailed analysis aimed at identifying vulnerabilities, configuration errors, and issues in the application&#8217;s logic. It includes both technical aspects (e.g., code, infrastructure, protocols) and procedural elements (e.g., authentication methods, session management).<\/p>\n<p>It\u2019s advisable to conduct an audit when:<\/p>\n<ul>\n<li>A new application is being deployed or a major update is being implemented<\/li>\n<li>The organization is preparing for certification (e.g., ISO 27001)<\/li>\n<li>There is suspicion of an incident<\/li>\n<li>The application processes personal, financial, or strategic data<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>The Stages of an Application Security Audit &#8211; How Does the Process Work?<\/h2>\n<p>&nbsp;<\/p>\n<p>A professional application security audit is carried out in several stages:<\/p>\n<p>&nbsp;<\/p>\n<h3>1. Requirements and Architecture Analysis<\/h3>\n<p>At this stage, auditors gather information about the application, its business purpose, technology stack, external integrations, and user model. The analysis covers:<\/p>\n<ul>\n<li>Application architecture (monolithic, microservices, serverless)<\/li>\n<li>Authorization and authentication methods<\/li>\n<li>Availability of the application (public or restricted)<\/li>\n<li>Technology stack (e.g., Node.js, React, Spring, .NET, Laravel)<\/li>\n<li>Integrations with external APIs or systems (e.g., payments, CRM)<\/li>\n<\/ul>\n<p>The goal is to tailor the scope of testing to the application\u2019s specifics.<\/p>\n<h3>2. Manual and Automated Testing<\/h3>\n<p>Next, an active vulnerability analysis is conducted. Depending on the access model, the following <strong>tests<\/strong> are used:<\/p>\n<ul>\n<li><strong>Black-box<\/strong>: External testing with no knowledge of the internal system structure, simulating an attacker.<\/li>\n<li><strong>Grey-box<\/strong>: Testing with partial access (e.g., as a user with limited privileges).<\/li>\n<li><strong>White-box<\/strong>: Full access to the application, code, and documentation (most detailed tests).<\/li>\n<\/ul>\n<p><strong>Tools<\/strong> such as:<\/p>\n<ul>\n<li>Automated scanners (e.g., Burp Suite, ZAP, Acunetix)<\/li>\n<li>HTTP request manipulation, data injection, and OWASP Top 10 vulnerabilities are used.<\/li>\n<\/ul>\n<p>Auditors manually verify the vulnerabilities and assess their impact on the application&#8217;s security.<\/p>\n<h3>3. Source Code Review (Secure Code Review)<\/h3>\n<p>If the company provides source code, a detailed review is conducted. Auditors check for:<\/p>\n<ul>\n<li>Presence of dangerous functions (e.g., eval, exec, dynamic SQL)<\/li>\n<li>Lack of input validation<\/li>\n<li>Session and cookie management<\/li>\n<li>Use of dependencies and libraries that may contain known vulnerabilities<\/li>\n<\/ul>\n<p>Secure code reviews help identify errors not detected by interface-level tests.<\/p>\n<h3>4. Access and Configuration Verification<\/h3>\n<p>This stage involves testing for security misconfigurations, such as errors in environmental settings, permissions, roles, and resources. Areas under analysis include:<\/p>\n<ul>\n<li>Logging and session management mechanisms (e.g., timeouts, two-factor authentication)<\/li>\n<li>Role-based access control (RBAC), attribute-based access control (ABAC)<\/li>\n<li>Password policies and storage practices<\/li>\n<li>Server configurations, security headers, and HTTP Strict Transport Security (HSTS)<\/li>\n<li>API endpoint security (e.g., HTTP method restrictions, brute-force protection)<\/li>\n<\/ul>\n<h3>5. Final Report and Recommendations<\/h3>\n<p>Finally, a technical and managerial report is prepared, including:<\/p>\n<ul>\n<li>Detailed descriptions of identified vulnerabilities (with risk level classification)<\/li>\n<li>Attack vectors and evidence (e.g., screenshots, logs, payloads)<\/li>\n<li>Recommendations for fixing and securing the application<\/li>\n<li>Classification according to CVSS or OWASP standards<\/li>\n<li>Summary of business risks in a format understandable to management<\/li>\n<\/ul>\n<p>The report may also serve as evidence of preventive actions during audits for compliance with ISO 27001, GDPR, NIS2, or DORA.<\/p>\n<p>&nbsp;<\/p>\n<h2>The Most Common Vulnerabilities Found During an Audit<\/h2>\n<p>During audits, vulnerabilities from the OWASP Top 10 are frequently found, such as:<\/p>\n<ul>\n<li>Broken Access Control: Users can access resources they shouldn\u2019t have permission to.<\/li>\n<li>Injection (e.g., SQLi): Unauthorized queries can be made to the database.<\/li>\n<li>Insecure Authentication: Lack of login and password protection, e.g., no login attempt limits.<\/li>\n<li>Security Misconfiguration: Default server settings, lack of encryption, overly broad permissions.<\/li>\n<li>Exposed APIs: Poorly secured interfaces that allow data takeover or unauthorized operations.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Application Security Audit vs Penetration Testing &#8211; Similarities and Differences<\/h2>\n<p>Although these terms are often used interchangeably, audits and penetration tests differ in scope and purpose:<\/p>\n<table style=\"border-style: solid;\" border=\"tak\">\n<thead>\n<tr>\n<td style=\"width: 91px;\"><strong>Criterion<\/strong><\/td>\n<td style=\"width: 302px;\"><strong>Application Security Audit<\/strong><\/td>\n<td style=\"width: 381px;\"><strong>Penetration Testing<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 91px;\"><strong>Scope<\/strong><\/td>\n<td style=\"width: 302px;\">Detailed analysis of logic, code, configuration<\/td>\n<td style=\"width: 381px;\">Simulated attack from the perspective of an external attacker<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 91px;\"><strong>Method<\/strong><\/td>\n<td style=\"width: 302px;\">Manual, semi-automatic, documentation-based<\/td>\n<td style=\"width: 381px;\">Exploiting vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 91px;\"><strong>Goal<\/strong><\/td>\n<td style=\"width: 302px;\">Identify design errors and compliance with standards<\/td>\n<td style=\"width: 381px;\">Test what can be gained through an attack<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>In practice, both approaches complement each other and should be used alternately.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2>Security audits and Compliance with GDPR, ISO 27001, NIS2<\/h2>\n<p>An application security audit is a critical element of proving compliance with regulations:<\/p>\n<ul>\n<li>GDPR \u2013 Article 32 mandates appropriate technical and organizational measures.<\/li>\n<li>ISO 27001 \u2013 Control A.12.6.1 requires vulnerability management.<\/li>\n<li>NIS2 and DORA \u2013 Require active testing and documented resilience for critical applications.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>What Does an Application Audit Report Include?<\/h2>\n<p>A good audit report goes beyond just listing vulnerabilities. It should contain:<\/p>\n<ul>\n<li>Threat descriptions with priorities (e.g., based on CVSS)<\/li>\n<li>Technical and organizational recommendations<\/li>\n<li>Risk assessments for individual components<\/li>\n<li>Information for IT departments, management, and compliance teams<\/li>\n<\/ul>\n<p>This enables the organization to fix errors and manage risks more effectively.<\/p>\n<p>&nbsp;<\/p>\n<h2>FAQ &#8211; Frequently Asked Questions<\/h2>\n<p>&nbsp;<\/p>\n<h3>Is an application audit mandatory?<br \/>\n<span style=\"color: #666666; font-size: 14px;\">Not always, but in many industries (e.g., finance), it\u2019s required by regulations or clients.<\/span><\/h3>\n<h3>How long does an application security audit take?<br \/>\n<span style=\"color: #666666; font-size: 14px;\">Typically, 5 to 15 working days, depending on the application\u2019s complexity and source code access.<\/span><\/h3>\n<h3>Is access to the source code necessary?<br \/>\n<span style=\"color: #666666; font-size: 14px;\">Not always, but code analysis significantly improves the audit\u2019s effectiveness.<\/span><\/h3>\n<h3>Does the audit disrupt application functionality?<br \/>\n<span style=\"color: #666666; font-size: 14px;\">No, tests are performed safely, usually on a test environment.<\/span><\/h3>\n<h3>What\u2019s the difference between an audit and an API security test?<br \/>\n<span style=\"color: #666666; font-size: 14px;\">An audit covers the entire application, while an API test focuses solely on the communication interfaces.<\/span><\/h3>\n<h3>Conclusion<\/h3>\n<p>An application security audit is a crucial step in ensuring business continuity, regulatory compliance, and customer trust. In the dynamic digital world, it\u2019s not a matter of <em>if<\/em> someone will attempt to attack your application, but <em>when<\/em> \u2013 and whether you\u2019ll be prepared.<\/p>\n<h3><strong>Want to check your application\u2019s security?<\/strong><br \/>\nGet a free consultation with the Cyberforces team! <a href=\"https:\/\/cyberforces.com\/en\/contact-2\">Contact us!<\/a><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Web and mobile applications have become the backbone of business operations in nearly every industry. They process personal data, handle payments, support logistics processes, and facilitate communication with clients. However, they are also attractive targets for cybercriminals. Even a small vulnerability can lead to significant losses. An application security audit helps identify these weaknesses [&hellip;]<\/p>\n","protected":false},"author":25,"featured_media":253758,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29],"tags":[],"class_list":["post-253757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Security Audit - CyberForces<\/title>\n<meta name=\"description\" content=\"Learn how an application security audit can help identify vulnerabilities, meet regulatory requirements, and enhance your company\u2019s security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/application-security-audit\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Security Audit - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Learn how an application security audit can help identify vulnerabilities, meet regulatory requirements, and enhance your company\u2019s security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/application-security-audit\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-13T12:29:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Diana Ma\u0142yszko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana Ma\u0142yszko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit\"},\"author\":{\"name\":\"Diana Ma\u0142yszko\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\"},\"headline\":\"Application Security Audit\",\"datePublished\":\"2025-08-13T12:29:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit\"},\"wordCount\":1125,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit\",\"url\":\"https:\/\/cyberforces.com\/en\/application-security-audit\",\"name\":\"Application Security Audit - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr\",\"datePublished\":\"2025-08-13T12:29:24+00:00\",\"description\":\"Learn how an application security audit can help identify vulnerabilities, meet regulatory requirements, and enhance your company\u2019s security\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/application-security-audit\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr\",\"width\":1200,\"height\":675,\"caption\":\"Application security audit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/application-security-audit#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Security Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\",\"name\":\"Diana Ma\u0142yszko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"caption\":\"Diana Ma\u0142yszko\"},\"url\":\"https:\/\/cyberforces.com\/en\/author\/diana-malyszko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Security Audit - CyberForces","description":"Learn how an application security audit can help identify vulnerabilities, meet regulatory requirements, and enhance your company\u2019s security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/application-security-audit","og_locale":"en_US","og_type":"article","og_title":"Application Security Audit - CyberForces","og_description":"Learn how an application security audit can help identify vulnerabilities, meet regulatory requirements, and enhance your company\u2019s security","og_url":"https:\/\/cyberforces.com\/en\/application-security-audit","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2025-08-13T12:29:24+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr","type":"image\/png"}],"author":"Diana Ma\u0142yszko","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Diana Ma\u0142yszko","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/application-security-audit#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/application-security-audit"},"author":{"name":"Diana Ma\u0142yszko","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb"},"headline":"Application Security Audit","datePublished":"2025-08-13T12:29:24+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/application-security-audit"},"wordCount":1125,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/application-security-audit","url":"https:\/\/cyberforces.com\/en\/application-security-audit","name":"Application Security Audit - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr","datePublished":"2025-08-13T12:29:24+00:00","description":"Learn how an application security audit can help identify vulnerabilities, meet regulatory requirements, and enhance your company\u2019s security","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/application-security-audit#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/application-security-audit"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/application-security-audit#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Application-security-audit_1200x675.png?wsr","width":1200,"height":675,"caption":"Application security audit"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/application-security-audit#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Application Security Audit"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb","name":"Diana Ma\u0142yszko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","caption":"Diana Ma\u0142yszko"},"url":"https:\/\/cyberforces.com\/en\/author\/diana-malyszko"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=253757"}],"version-history":[{"count":3,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253757\/revisions"}],"predecessor-version":[{"id":253763,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253757\/revisions\/253763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/253758"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=253757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=253757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=253757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}