APIs allow external applications or services to interact with the LLM, usually through REST or GraphQL endpoints.
This document provides a high-level overview of major XML technologies. It's designed for developers who need a quick refresher on core concepts, common quirks, and practical examples.
The foundation. A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
- The
<animate>
element in SVG is used to animate attributes of another SVG element. - Host element = the element whose attribute is being animated.
- If
<animate>
has nohref
, the parent element becomes the host. - If
<animate href="#id">
is present, the host = the element with that ID.
- If
JavaScript can technically be written using only Unicode escape sequences or Unicode homoglyphs. This makes code valid to the JS engine but unreadable or misleading to humans. It is often used in obfuscation, XSS payloads, or supply chain attacks.
HTTP Method Spoofing is when a client sends a request that appears to be a safe or allowed HTTP method (POST
, GET
), but actually instructs the server-side framework to treat it as a different method (PUT
, PATCH
, DELETE
) via a hidden parameter or HTTP header.
Purpose:
- Originally added to support RESTful routes when HTML forms only supported
GET
andPOST
. - Can be abused if access control is weak.
This checklist covers key GraphQL concepts such as queries, mutations, subscriptions, introspection, variables, fields, types, and arguments, along with related vulnerability assessment and penetration testing pointers.
Standard read operations used to fetch data.
SAML is primarily used for single sign-on (SSO) and authentication within enterprise environments
- User tries to access a protected page.
- SP generates a
SAMLRequest
and redirects to IdP.