Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis

Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis

Posted on January 14, 2026January 14, 2026 By CWS

Mandiant has launched AuraInspector, an open-source command-line software that helps safety defenders establish and audit access-control misconfigurations within the Salesforce Aura framework.

The software addresses a crucial safety hole in Salesforce Expertise Cloud deployments, the place misconfigurations incessantly expose delicate information, together with bank card numbers, id paperwork, and well being data.

The Aura endpoint, a basic element of Salesforce’s Lightning Expertise interface, is without doubt one of the mostly focused assault surfaces in Expertise Cloud purposes.

Salesforce’s object sharing guidelines span a number of configuration ranges, making it difficult for directors to establish potential access-control misconfigurations from an exterior perspective.

AuraInspector automates the detection of those exposures and gives actionable remediation insights.

The software leverages a number of assault methods beforehand documented by Mandiant’s Offensive Safety Companies workforce.

FeatureDescriptionAutomatic Aura DetectionFinds the Aura endpoint automaticallyObject Entry ScanChecks which objects and information are accessibleRecord Listing DiscoveryFinds uncovered file lists and their URLsSelf-Registration CheckChecks if self-signup is enabled and will get signup linksURL DiscoveryFinds house and admin URLs automaticallyGraphQL BypassUses a GraphQL methodology to fetch greater than 2,000 recordsAction BulkingSends a number of actions in a single requestRead-Solely ModeOnly reads information, makes no changesCommand-Line ToolSimple CLI for scanning and reportsOpen SourceAvailable on GitHub

It identifies accessible objects through Aura strategies resembling getItems and getConfigData, which might expose delicate information when entry controls are improperly configured.

AuraInspector additionally checks for uncovered File Lists, that are Salesforce parts that present direct entry to object information when permissions are misconfigured.

A major function is the software’s potential to detect enabled self-registration endpoints.

Mandiant noticed situations during which self-registration hyperlinks have been faraway from login pages. But, the performance remained enabled, permitting unauthorized account creation.

Breakthrough: GraphQL Integration

AuraInspector introduces a beforehand undocumented approach utilizing Salesforce’s GraphQL Aura controller to bypass the usual 2,000-record retrieval restrict.

utilizing the GraphQL Aura Controller

This enables a complete evaluation of misconfiguration impression with out guide sorting workarounds.

The software automates the development of GraphQL queries to retrieve full datasets when entry controls fail.

The software routinely discovers crucial contextual data, together with Aura endpoints, house and file checklist URLs, self-registration standing, and accessible administration panels.

It performs strictly read-only operations, guaranteeing examined situations stay unmodified. Mandiant recommends directors audit visitor person permissions utilizing the precept of least privilege.

Assist message of the AuraInspector software

Evaluate sharing guidelines and organization-wide defaults, flip off pointless self-registration, and implement Salesforce safety greatest practices.

The Safety Well being Verify software and the excellent Salesforce Safety Information present extra steering for hardening.

AuraInspector is accessible now on GitHub, enabling safety groups to establish and remediate Aura-related exposures earlier than adversaries exploit them proactively.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Analysis, Aura, Framework, Misconfiguration, OpenSource, Salesforce, Tool

Post navigation

Previous Post: Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution
Next Post: Microsoft Warns Secure Boot May Be Bypassed as Windows UEFI Certificates Expire

Related Posts

Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Cyber Security News
Critical Zoom Vulnerabilities in Windows Prompt Immediate Updates Critical Zoom Vulnerabilities in Windows Prompt Immediate Updates Cyber Security News
Google Launches Ransomware Protection for Drive Google Launches Ransomware Protection for Drive Cyber Security News
Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts Cyber Security News
SoundCloud Data Breach Exposes 29.8 Million Personal users Details SoundCloud Data Breach Exposes 29.8 Million Personal users Details Cyber Security News
Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark