Business Logic Testing

Data Validation

Ability to Forge Requests

Integrity Checks

Process Timing

Number of Times a Function Can be Used Limits

Circumvention of Work Flows

Defenses Against Application Mis-use

Upload of Unexpected File Types

Upload of Malicious Files