๐Ÿ” Cryptographic Failure: Plaintext Password Storage

This demo shows a vulnerable API that stores user credentials without any encryption. This violates basic cryptographic security practices and is commonly exploited in data breaches.

๐Ÿงช How to Test Using Postman

  1. Open Postman or any API client.
  2. Send aย POSTย  request to:ย /api/vuln-crypto
  3. In the Body tab, select raw โ†’ JSON and send:
    {
      "username": "testuser",
      "password": "supersecret123"
    }
  4. Observe that the response includes your password in plaintext:
    {
      "status": "User stored (insecurely)",
      "storedUser": {
        "username": "testuser",
        "password": "supersecret123"
      }
    }

Waiting for test...

Best practice is to hash passwords using strong algorithms (e.g., bcrypt or Argon2).