OAuth 2.0 Authorization (Authz Response Leaks)

This is an analysis of various OAuth flows under the assumption that the authorization response leaks and no other attacks are performed on the OAuth flows (e.g., endpoints are configured correctly and do not act maliciously, etc.).

Security Properties

Rules used

(see labels in graph below)