<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>API on Medusa0xf</title>
    <link>https://medusa0xf.com/tags/api/</link>
    <description>Recent content in API on Medusa0xf</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 Medusa0xf</copyright>
    <lastBuildDate>Thu, 05 Dec 2024 19:43:35 +0100</lastBuildDate><atom:link href="https://medusa0xf.com/tags/api/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Bypassing Rate Limit in GraphQL</title>
      <link>https://medusa0xf.com/posts/bypassing-rate-limit-in-graphql/</link>
      <pubDate>Thu, 05 Dec 2024 19:43:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/bypassing-rate-limit-in-graphql/</guid>
      <description>What is GraphQL?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/bypassing-rate-limit-in-graphql/featured.gif" />
    </item>
    
    <item>
      <title>Exploiting insecure output handling in LLMs</title>
      <link>https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/</link>
      <pubDate>Sun, 21 Jul 2024 12:42:00 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/</guid>
      <description>Introduction #In the previous blog, I discussed indirect prompt injection and its potential applications.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/featured.png" />
    </item>
    
    <item>
      <title>Indirect prompt injection</title>
      <link>https://medusa0xf.com/posts/indirect-prompt-injection/</link>
      <pubDate>Sun, 14 Jul 2024 12:04:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/indirect-prompt-injection/</guid>
      <description>Learn about the risks and techniques of indirect prompt injection in Large Language Models (LLMs).</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/indirect-prompt-injection/featured.gif" />
    </item>
    
    <item>
      <title>Exploiting vulnerabilities in LLM APIs</title>
      <link>https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/</link>
      <pubDate>Sat, 29 Jun 2024 22:34:07 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/</guid>
      <description>What is OS command injection?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/featured.png" />
    </item>
    
    <item>
      <title>Exploiting LLM APIs with excessive agency</title>
      <link>https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/</link>
      <pubDate>Sat, 22 Jun 2024 23:04:07 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/</guid>
      <description>What is Excessive Agency in LLM API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/featured.png" />
    </item>
    
    <item>
      <title>What is LLM APIs and how they work?</title>
      <link>https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/</link>
      <pubDate>Tue, 18 Jun 2024 15:04:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/</guid>
      <description>What is an LLM API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/featured.jpg" />
    </item>
    
    <item>
      <title>HTTP Parameter Pollution vs Mass Assignment</title>
      <link>https://medusa0xf.com/posts/http-parameter-pollution-vs-mass-assignment/</link>
      <pubDate>Tue, 04 Jun 2024 22:20:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/http-parameter-pollution-vs-mass-assignment/</guid>
      <description>In this blog, we are going to see the difference between HTTP parameter pollution and mass assignment.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/http-parameter-pollution-vs-mass-assignment/featured.png" />
    </item>
    
    <item>
      <title>Understanding and Testing Authentication methods in REST API</title>
      <link>https://medusa0xf.com/posts/testing-auth-methods-in-rest-api/</link>
      <pubDate>Thu, 09 May 2024 21:21:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/testing-auth-methods-in-rest-api/</guid>
      <description>What is Authentication?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/testing-auth-methods-in-rest-api/featured.gif" />
    </item>
    
    <item>
      <title>API Basics: A Hacker&#39;s Starter Guide</title>
      <link>https://medusa0xf.com/posts/api-basics-hsg/</link>
      <pubDate>Thu, 21 Mar 2024 21:42:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/api-basics-hsg/</guid>
      <description>What is an API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/api-basics-hsg/featured.gif" />
    </item>
    
    <item>
      <title>Exploiting SQL Injection in Graphql | DVGA |</title>
      <link>https://medusa0xf.com/posts/sqli-in-graphql-dvga/</link>
      <pubDate>Sun, 17 Mar 2024 21:39:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/sqli-in-graphql-dvga/</guid>
      <description>This article covers exploiting SQL Injection manually in a Graphql Application.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/sqli-in-graphql-dvga/featured.png" />
    </item>
    
    <item>
      <title>How to Discover API Subdomains? | API Hacking |</title>
      <link>https://medusa0xf.com/posts/api-subdomains/</link>
      <pubDate>Tue, 12 Mar 2024 22:05:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/api-subdomains/</guid>
      <description>How to Discover API Subdomains?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/api-subdomains/featured.png" />
    </item>
    
    <item>
      <title>Server Side Parameter Pollution in Rest API path parameter</title>
      <link>https://medusa0xf.com/posts/server-side-parameter-pollution/</link>
      <pubDate>Mon, 04 Mar 2024 11:50:00 +0001</pubDate>
      
      <guid>https://medusa0xf.com/posts/server-side-parameter-pollution/</guid>
      <description>What is Server Side Parameter Pollution?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/server-side-parameter-pollution/feature.png" />
    </item>
    
    <item>
      <title>How to Perform CSRF Attack in GraphQL</title>
      <link>https://medusa0xf.com/posts/csrf-in-graphql/</link>
      <pubDate>Tue, 16 Jan 2024 22:05:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/csrf-in-graphql/</guid>
      <description>What is a CSRF Attack?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/csrf-in-graphql/featured.png" />
    </item>
    
    <item>
      <title>Broken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking</title>
      <link>https://medusa0xf.com/posts/api-broken-auth/</link>
      <pubDate>Mon, 13 Jun 2022 20:55:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/api-broken-auth/</guid>
      <description>In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality Level Authorization (BFLA) in APIs.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/api-broken-auth/featured.png" />
    </item>
    
  </channel>
</rss>
