Сейчас ищут
Access Control Vulnerabilitites. Смотреть видео: Broken Access Control Complete Guide, 2021 OWASP Top Ten Broken Access Control, Part I Bug Bounty Hunting For IDORs And Access Control Violations, Part II Bug Bounty Hunting For IDORs And Access Control Violations.