← Back to Home

🔥 Vulnerable IAM Implementation

This page demonstrates intentionally insecure IAM design patterns.

1. Insecure Login

This login form uses hard-coded credentials, lacks MFA, and generates a predictable session token.

2. Insecure RBAC & Provisioning

This system assigns roles without validation and never removes old roles — causing privilege creep and orphaned access.

Current Roles (Unvalidated + Persistent)

3. Insecure Audit Log

The audit log has: - No timestamps - No user verification - No integrity - Spoofable entries

Audit Log (Vulnerable)