Sitemap
1 min readMay 24, 2019

All the steps of the flow are vulnerable if someone is able to listen to the requests made by the client application: man-in-the-middle, session fixation, CSRF and so on.

The client and the server should set up and use all the protection mechanisms to avoid those attacks.

Lorenzo Spyna
Lorenzo Spyna

Written by Lorenzo Spyna

💻Writes web2 and web3 code | 🚀 firenze.dev co-founder | 🥑 0xpolygon Advocate — https://spyna.it

No responses yet