{"id":9429,"date":"2025-10-21T09:26:54","date_gmt":"2025-10-21T07:26:54","guid":{"rendered":"https:\/\/the-s-unit.nl\/?page_id=9429"},"modified":"2025-10-21T09:26:55","modified_gmt":"2025-10-21T07:26:55","slug":"tsu-03-insecure-microflows","status":"publish","type":"page","link":"https:\/\/the-s-unit.nl\/en\/tsu-03-insecure-microflows\/","title":{"rendered":"TSU-03: Insecure Microflows"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"9429\" class=\"elementor elementor-9429\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aaa94ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aaa94ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0427a99\" data-id=\"0427a99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-434b2fe elementor-widget elementor-widget-heading\" data-id=\"434b2fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The S-Unit Top 10<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ea8deb elementor-widget elementor-widget-image\" data-id=\"8ea8deb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-300x300.png\" class=\"attachment-medium size-medium wp-image-9434\" alt=\"TSu-03: insecure microflows\" srcset=\"https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-300x300.png 300w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-1024x1024.png 1024w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-150x150.png 150w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-768x768.png 768w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-500x500.png 500w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-12x12.png 12w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-600x600.png 600w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3-100x100.png 100w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2025\/10\/The-S-unit-Top-10-Carousel-LinkedIn-Post-3.png 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ceb434 elementor-widget elementor-widget-heading\" data-id=\"3ceb434\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">TSU-03: Insecure Microflows<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9f2f3bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9f2f3bf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0f4929c\" data-id=\"0f4929c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7ea66a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b7ea66a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">TSU-03 focuses on the  <strong> insecure configuration or implementation of microflows <\/strong>, a crucial part of Mendix security. By designing microflows carefully, managing authorizations strictly, and consistently building in validations, you prevent sensitive logic or data from being unintentionally exposed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a67f268 elementor-widget elementor-widget-spacer\" data-id=\"a67f268\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07f0866 elementor-widget elementor-widget-heading\" data-id=\"07f0866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incorrect microflow settings can undermine security.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03657df elementor-widget elementor-widget-text-editor\" data-id=\"03657df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microflows form the core of backend validations and sensitive functions within a Mendix app. They often run with elevated privileges and frequently process user input.<\/p><p class=\"translation-block\">By default, Mendix blocks access to microflows. Developers decide which module roles are allowed to execute them. An overly broad configuration or insufficient validation can lead to unauthorized access, data manipulation, or even circumvention of security mechanisms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d429f18 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d429f18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bde79ee\" data-id=\"bde79ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-492a61b elementor-widget elementor-widget-heading\" data-id=\"492a61b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reduce risks by designing your microflows smartly and securely.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acdef05 elementor-widget elementor-widget-text-editor\" data-id=\"acdef05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To prevent TSU-03 vulnerabilities, consider for each microflow who is allowed to call it and what validations are required. Follow these best practices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d54948 premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"7d54948\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\n\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-f2ae3bd\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Gebruik een duidelijke naamgeving voor microflows. Vermeld of ze door de gebruikersinterface mogen worden aangeroepen en door welke module roles.\">Use a clear naming convention that shows whether a microflow can be called from the UI and by which module roles.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-3abd4b8\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Houd bij welke acties binnen een microflow een gebruiker normaal niet zou kunnen uitvoeren (bijvoorbeeld vanwege ontbrekende rechten of backend-interacties) en beschouw deze acties als gevoelig.\">Identify actions within the microflow that end users normally cannot perform (for example, backend-only operations) and mark these as sensitive.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-8ceb117\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Bevat de microflow geen gevoelige acties? Zet deze om in een nanoflow.\">If the microflow doesn\u2019t perform sensitive actions, convert it to a nanoflow.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-1ecc7b4\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Breng in kaart welke data in de microflow afkomstig is van gebruikers. Behandel deze waarden als user input en valideer ze altijd.\">Track all user-provided data in the microflow: including parameters, writable attributes, and retrieved entities and treat them as input that must be validated.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-19f1c18\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Zorg dat elke microflow die door gebruikers kan worden aangeroepen, autorisatie- en validatieregels bevat v\u00f3\u00f3rdat gevoelige acties worden uitgevoerd.\">Ensure that user-exposed microflows perform authorization and input validation before executing sensitive actions.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-186ffb8\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Ga er niet van uit dat alleen een \u201cCommit\u201d-actie gevoelige wijzigingen uitvoert. Elke wijziging aan een attribuut kan worden opgeslagen, dus pas dezelfde controles toe \u2014 met of zonder commit.\">Do not assume that only the \u201cCommit\u201d action saves data. Any attribute change may be stored, with or without an explicit commit. Apply the same security checks in both cases.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-6c9002d\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Vermijd microflows die alleen bestaan uit valideren-en-opslaan. Deze kunnen volledig worden omzeild. Voeg altijd een stap toe die de gebruiker niet zelf kan uitvoeren, bijvoorbeeld:\">Avoid \u201cvalidate-then-commit\u201d microflows that rely solely on client-side validation. These can be bypassed. Add a backend-only step the user cannot perform, such as:<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bea72ad premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"bea72ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\n\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-54551d7\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw fa fa-check\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Het wijzigen van een read-only attribuut na validatie (zoals Status \u2192 Approved), gecombineerd met een statusafhankelijke XPath-constraint.\">Changing a read-only attribute after validation (e.g., Status = Approved), combined with a status-based XPath constraint.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-7202b5e\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw fa fa-check\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Het aanmaken van een read-only persistent object na validatie van invoer.\">Creating a read-only persistent object after validating user input.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d98b792 premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"d98b792\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\n\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-cfcd74b\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Houd er rekening mee dat alle entiteiten die in een microflow worden aangemaakt of gewijzigd, zichtbaar kunnen worden voor de gebruiker. Dit geldt ook voor niet-persistente entiteiten en onopgeslagen wijzigingen.\">Assume that all entities created or modified in a microflow can be exposed to the user, including non-persistent entities and uncommitted changes.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b6eb0c premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"4b6eb0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\n\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-b61e0ae\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-eye\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Verwijder tijdelijke objecten zodra ze niet meer nodig zijn, vooral in sub-microflows.\">Delete temporary objects once they\u2019re no longer needed, especially in sub-microflows.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b501365 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b501365\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dbef240\" data-id=\"dbef240\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9943f5e elementor-widget elementor-widget-heading\" data-id=\"9943f5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerabilities within TSU-03<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8545a2 elementor-widget elementor-widget-text-editor\" data-id=\"a8545a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The following vulnerabilities are common in insecurely configured microflows and illustrate where things often go wrong in practice.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc9a17c premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"fc9a17c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\n\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-a242583\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Ontbrekende autorisatie bij delete-microflows: gebruikers kunnen records verwijderen zonder de juiste rechten.\">Missing authorization checks in delete microflows: users can remove records without proper rights.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-e31d72a\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Ontbrekende autorisatie bij data-inzending: onbevoegde gebruikers kunnen gevoelige data toevoegen of wijzigen.\">Missing authorization in data submission microflows: unauthorized data can be added or altered.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-4719d80\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Geen validatie van objectparameters: ongeldige of ongeautoriseerde objecten kunnen worden verwerkt.\">No validation of object parameters: invalid or unauthorized objects may be processed.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-454fb3c\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Geen validatie van niet-objectparameters (zoals strings of integers): kan leiden tot injectie of verkeerde verwerking.\">No validation of non-object parameters (such as strings or integers): increases the risk of injection or logic manipulation.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-71cbb8e\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Ontbrekende validatie na database-opvraging: gewijzigde of malafide data kan worden doorgezet.\">No validation after database retrieval: untrusted data might flow into critical processes.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-1bff9b4\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Validaties alleen in nanoflows: zonder bijbehorende controle in de backend-microflow kunnen ze eenvoudig worden omzeild.\">Validation only in nanoflows: without matching backend checks, these can be easily bypassed.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-cb84aa7\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Datavalidatie omzeild door onopgeslagen wijzigingen: gebruikers zien of wijzigen data die nog niet gevalideerd is.\">Data validation bypass through uncommitted changes: users may view or alter data before it\u2019s validated.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-f695829\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Gevoelige data blootgesteld via tijdelijke niet-persistente entiteiten: vertrouwelijke informatie kan zichtbaar worden.\">Exposure of sensitive data via temporary non-persistent entities: confidential information may become visible.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-66c32a7\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Omzeiling van beveiliging via directe toegang tot sub-microflows: subflows zonder toegangscontrole zijn direct aan te roepen.\">Security bypass via direct access to sub-microflows: unprotected subflows can be called directly.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-ae20ab7\">\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-drawable-icon\"><i class=\"premium-svg-nodraw far fa-comment-dots\" aria-hidden=\"true\"><\/i><\/div>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-text\" data-text=\"\">  <\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-bullet-list-desc\" data-text=\"Omzeiling via directe toegang tot administratieve microflows: gebruikers krijgen toegang tot beheerfuncties zonder juiste rechten.\">Security bypass via direct access to administrative microflows : grants backend control to unauthorized users.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bd960f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bd960f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57d706d\" data-id=\"57d706d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d817b4f elementor-widget elementor-widget-heading\" data-id=\"d817b4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integrate The S-Unit Top 10 into your CI\/CD pipeline.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c0273f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c0273f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-31aa2aa\" data-id=\"31aa2aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-816ed96 elementor-widget elementor-widget-text-editor\" data-id=\"816ed96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Want to know how your Mendix application scores on The S-Unit Top 10?\nIn collaboration with Omnext, we\u2019ve developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI\/CD pipeline, risks are detected early and made immediately visible.\nFor questions, feel free to contact us.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The S-Unit Top 10 TSU-03: Insecure Microflows TSU-03 draait om onveilige configuratie of implementatie van microflows, een cruciaal onderdeel van Mendix-beveiliging.Door microflows zorgvuldig te ontwerpen, autorisaties strikt te beheren en validaties structureel in te bouwen, voorkom je dat gevoelige logica of data onbedoeld wordt blootgesteld. Onjuiste microflow-instellingen kunnen beveiliging ondermijnen Microflows vormen de kern van [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-9429","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/pages\/9429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/comments?post=9429"}],"version-history":[{"count":13,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/pages\/9429\/revisions"}],"predecessor-version":[{"id":9477,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/pages\/9429\/revisions\/9477"}],"wp:attachment":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/media?parent=9429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}