<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>chs.us — Carl Sampson</title><link>https://chs.us/</link><description/><language>en-us</language><managingEditor>carl.sampson@gmail.com (Carl Sampson)</managingEditor><webMaster>carl.sampson@gmail.com (Carl Sampson)</webMaster><lastBuildDate>Fri, 10 Apr 2026 17:05:31 -0400</lastBuildDate><atom:link href="https://chs.us/tags/api-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Comprehensive GraphQL Security Guide</title><link>https://chs.us/guides/graphql/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/graphql/</guid><description>A practitioner&amp;#39;s reference for attacking and defending GraphQL APIs — discovery, introspection, schema recovery, injection, authorization flaws, batching, DoS, subscriptions, CSRF/CSWSH, engine-specific quirks, and detection/prevention. Compiled from 31 research sources.</description><category>Security-Guides</category><category>Graphql</category><category>Api-Security</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive API Security Guide</title><link>https://chs.us/guides/api-security/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/api-security/</guid><description>A practitioner&amp;#39;s reference for API security — attack surface, OWASP API Top 10 exploitation, authentication and authorization bypasses, GraphQL-specific attacks, rate limit evasion, real-world chains, and detection/prevention. Compiled from 30 research sources.</description><category>Security-Guides</category><category>Api-Security</category><category>Web-Security</category><category>Authentication</category><category>Penetration-Testing</category></item></channel></rss>