Business Logic Testing
Data Validation
Ability to Forge Requests
Integrity Checks
Process Timing
Number of Times a Function Can be Used Limits
Circumvention of Work Flows
Defenses Against Application Mis-use
Upload of Unexpected File Types
Upload of Malicious Files