TSU-03 focuses on the insecure configuration or implementation of microflows , a crucial part of Mendix security. By designing microflows carefully, managing authorizations strictly, and consistently building in validations, you prevent sensitive logic or data from being unintentionally exposed.
Microflows form the core of backend validations and sensitive functions within a Mendix app. They often run with elevated privileges and frequently process user input.
By default, Mendix blocks access to microflows. Developers decide which module roles are allowed to execute them. An overly broad configuration or insufficient validation can lead to unauthorized access, data manipulation, or even circumvention of security mechanisms.
To prevent TSU-03 vulnerabilities, consider for each microflow who is allowed to call it and what validations are required. Follow these best practices.
The following vulnerabilities are common in insecurely configured microflows and illustrate where things often go wrong in practice.
Want to know how your Mendix application scores on The S-Unit Top 10? In collaboration with Omnext, we’ve developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI/CD pipeline, risks are detected early and made immediately visible. For questions, feel free to contact us.