Business Logic Flaws: How to Prevent Them in Your Web Apps

OVERVIEW

Business Logic vulnerabilities are not bugs in code—they’re failures in design, especially difficult to detect in modern applications. They occur when an attacker leverages valid features in unintended ways to bypass rules, abuse workflows, or manipulate sensitive operations. These flaws don’t show up in typical vulnerability scans, yet they can lead to major financial, reputational, and compliance damage.

This session explores how these issues arise in real-world systems, including REST and GraphQL APIs, and why they often go undetected until exploitation. Drawing from field experience building detection algorithms that analyze undocumented API behavior, we’ll discuss practical techniques to identify logic flaws early.

Attendees will learn how to incorporate business logic awareness into their threat modeling, improve test coverage in CI/CD pipelines, and build more resilient applications by understanding how users—and attackers—can interact with functionality at scale.

Presented By

Blue Team Con Logo - blue background with white logo

TRISTAN KALOS

CTO & Co-founder

Antoine Carossio Headshot

ANTOINE CAROSSIO

CTO & Co-founder