Skip to Content Facebook Feature Image

Intruder Introduces Autoswagger: The Free Tool To Expose Hidden API Authorization Flaws

News

Intruder Introduces Autoswagger: The Free Tool To Expose Hidden API Authorization Flaws
News

News

Intruder Introduces Autoswagger: The Free Tool To Expose Hidden API Authorization Flaws

2025-07-22 17:01 Last Updated At:17:10

LONDON--(BUSINESS WIRE)--Jul 22, 2025--

Intruder, a leader in attack surface management, has launched Autoswagger—a free, open-source tool that scans OpenAPI-documented APIs for broken authorization vulnerabilities. These flaws are still common, even at large enterprises with mature security teams, and are especially dangerous because they can be exploited with little technical skill. Autoswagger is available now on GitHub .

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20250722587023/en/

Autoswagger automatically detects authorization weaknesses in APIs and discovers sensitive endpoints not requiring authentication where the application fails to check for a valid API token.

According to Verizon’s 2025 Data Breach Investigations Report, API-related breaches increased nearly 40% year-over-year, with broken authorization cited as one of the most exploited flaws. While there are a wide range of tools that scan APIs, most options to detect broken authorization are either costly, inefficient, or require manual labor from penetration testers to uncover. This is the first freely available tool that is proven effective in detecting these potentially dangerous vulnerabilities.

“These vulnerabilities are so easy to exploit, you could teach someone with no technical background how to do it in a day,” said Chris Wallis, CEO and founder of Intruder. “When you consider how common these issues are and how frequently companies release new code or expose new endpoints, it’s clear this is a critical gap. That’s why we’re making Autoswagger available for free—to help teams find and fix these flaws before attackers do.”

API Sprawl Has Created an Increased Attack Surface for Organizations

APIs have become the backbone of modern applications, and the explosion of APIs has created an increased attack surface for every organization, especially those who depend heavily on third-party APIs (payments, analytics, social login, etc.)—which may introduce risks beyond their control. When broken authorization vulnerabilities are discovered and exploited by bad actors, the results can be very damaging such as the Optus data breach in 2022—when the Australian telecom company ended up paying $140 million AUD in related costs as a result of the sensitive customer data that was extracted via a simple API authorization.

While the attack on Optus brought a lot of initial attention to these vulnerabilities, three years later even members of the S&P 500 still remain exposed. During Intruder’s research and testing of Autoswagger, its security team detected exposed Salesforce records with personally identifiable information (PII) at a large multinational tech company and an exposed internal staff training application that would have allowed potential attackers to run queries against the database at a multinational soda company. Ultimately, this data could have been used to mount a phishing campaign against employees, with real information that could gain the staff member’s trust. The majority of the vulnerabilities discovered during the research process were for APIs intended for internal use.

How Autoswagger Detects Broken Authorization

Autoswagger begins by detecting API schemas across a range of common formats and locations, starting with a list of an organization’s domains. It scans for OpenAPI and Swagger documentation pages, sending requests to each host to locate valid schemas. Once identified, it parses the API specifications and automatically generates a list of endpoints to test, taking into account each endpoint’s definition, required parameters, and expected data types.

From there, Autoswagger executes targeted scans to identify broken authorization flaws by:

For more advanced use cases, Autoswagger can be run with the --brute flag to simulate bypassing validation checks. This helps uncover flaws in endpoints that require specific data formats or values, which may reject generic input.

Finally, the tool analyzes any successful responses for signs of exposed sensitive data, such as PII, credentials or internal records. Any endpoint missing proper authentication and returning sensitive information is included in the output report.

“Exposing documentation for your API effectively increases your attack surface, and as a defence in depth measure, you should not expose API documentation unless it’s a business requirement,” said Dan Andrew, Head of Security at Intruder. “The lesson here is, in addition to regular API scanning after each development iteration, that you shouldn’t publicly document your APIs unless you can’t avoid it. Without a ‘map,’ this kind of vulnerability becomes much harder for attackers to exploit.”

More information about how to deploy Autoswagger and the team’s journey to develop the solution can be found here on Intruder’s company blog. Autoswagger is free to download and install via Github.

About Intruder

Intruder's exposure management platform helps lean security teams stop breaches before they start by proactively discovering attack surface weaknesses. By unifying attack surface management, cloud security, and continuous vulnerability management in one intuitive platform, Intruder makes it easy to stay secure by cutting through the noise and complexity. Founded in 2015 by Chris Wallis, a former ethical hacker turned corporate blue teamer, Intruder is now protecting over 3,000 companies worldwide. Learn more at https://intruder.io.

Autoswagger output showing scanned endpoints that are missing authentication, along with an indicator of whether sensitive PII or secrets were discovered in the API response

Autoswagger output showing scanned endpoints that are missing authentication, along with an indicator of whether sensitive PII or secrets were discovered in the API response

LONDON (AP) — King Charles III has been “deeply touched” by the response to his update on his cancer treatment, Buckingham Palace said Saturday, adding that the monarch is pleased to have highlighted the value of screening programs for the disease.

Medics and health charities have praised the king for his openness, saying his statement on Friday had already prompted people to seek information about cancer.

In a strikingly personal video statement, the British monarch acknowledged that a cancer diagnosis can feel “overwhelming,” but said catching the disease early brings “the precious gift of hope.”

Here’s what to know about the king's condition and his message.

The 77-year-old king said in a statement broadcast Friday that his treatment schedule will be reduced in the new year, “thanks to early diagnosis, effective intervention and adherence to ‘doctors’ orders.’”

He encouraged others to take advantage of screening programs such as those for breast, bowel and cervical cancer offered by Britain’s public health service.

“Early diagnosis quite simply saves lives,” the king said in the statement aired during a “Stand Up to Cancer” telethon on TV station Channel 4. He said catching the disease early had allowed him “to continue leading a full and active life even while undergoing treatment.”

Charles has received outpatient treatment for almost two years. Buckingham Palace did not say the king is in remission, but that his treatment is moving to a “precautionary phase” and his condition will be monitored to ensure his continued recovery.

“I know from my own experience that a cancer diagnosis can feel overwhelming,” the king said in his video statement. “Yet I also know that early detection is the key that can transform treatment journeys, giving invaluable time to medical teams – and, to their patients, the precious gift of hope.”

Charles announced in February 2024 that he had been diagnosed with cancer, and, in a break from centuries of secrecy about royal health, he has since spoken about the illness, using his story to promote cancer awareness and treatment.

The openness has limits, though. The king has not disclosed what type of cancer he has or what kind of treatment he is receiving. The palace said it was an intentional decision designed to ensure his message reaches the widest possible audience.

The king’s cancer was discovered after treatment for an enlarged prostate. While doctors ruled out prostate cancer, tests revealed “a separate issue of concern,” palace officials said last year.

Charles suspended his public appearances for about two months after his diagnosis. Since returning to the public eye, he has visited cancer treatment centers across the country and shared stories with fellow patients.

Buckingham Palace said Charles “will be greatly encouraged and deeply touched by the very positive reaction" his message has generated. “He will be particularly pleased at the way it has helped to shine a light on the benefits of cancer screening programs,” it added.

British cancer charities said the number of people seeking information about cancer jumped after the king revealed he was undergoing treatment last year.

Cancer Research U.K. said about 100,000 people have visited its Screening Checker website since it was launched on Dec. 5, most of them since the king’s statement on Friday.

The charity's Chief Executive Michelle Mitchell said: “When public figures speak openly about their cancer diagnosis, it can prompt others to check in on their health.”

Broadcaster Jonathan Dimbleby, the king’s authorized biographer, said the statement was “a remarkable thing for a monarch to do.”

“It takes guts, and the fact that he came out and did that will save lives,’” Dimbleby said.

The Princess of Wales, who announced her own cancer diagnosis six weeks after her father-in-law, has also given updates on her treatment. Kate announced in January that her cancer is in remission.

Find more of AP’s coverage at https://apnews.com/hub/royalty

Britain's King Charles III attends an Advent Service at Westminster Abbey, in London, Wednesday, Dec. 10, 2025. (Chris Jackson/Pool Photo via AP)

Britain's King Charles III attends an Advent Service at Westminster Abbey, in London, Wednesday, Dec. 10, 2025. (Chris Jackson/Pool Photo via AP)

Britain's King Charles III attends an Advent Service at Westminster Abbey, in London, Wednesday, Dec. 10, 2025. (Chris Jackson/Pool Photo via AP)

Britain's King Charles III attends an Advent Service at Westminster Abbey, in London, Wednesday, Dec. 10, 2025. (Chris Jackson/Pool Photo via AP)

Recommended Articles