TSU-04 focuses on insecurely configured or implemented Published Integrations. Ensure that authentication, authorization, and validation are applied consistently, and that only trusted systems have access. This prevents your API integrations from becoming the weak spot of your Mendix app.
Published Integrations are the main way Mendix exposes microflows and entities to external systems through standard API formats such as SOAP, REST, or OData. They act as the bridge between your Mendix app and other services.
Typical use cases include:
Because these integrations often serve trusted systems, they frequently handle sensitive data and sometimes rely on custom authentication or authorization mechanisms. If a Published Integration is configured or implemented incorrectly, it can result in unauthorized access to data or functionality, or allow external parties to bypass intended restrictions.
To prevent TSU-04 vulnerabilities, ensure that only trusted systems can access your integrations. Limit privileges at two levels:
Follow these best practices:
The following vulnerabilities commonly occur within this category:
Want to know how your Mendix application scores on The S-Unit Top 10? In collaboration with Omnext, we’ve developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI/CD pipeline, risks are detected early and made immediately visible. For questions, feel free to contact us.