- Example #1. "As a hacker, I can send bad data in URLs, so I can access data and functions for which I'm not authorized."
- Example #2. "As a hacker, I can send bad data in the content of requests, so I can access data and functions for which I'm not authorized."
- Example #3. "As a hacker, I can send bad data in HTTP headers, so I can access data and functions for which I'm not authorized."
- Example #4. "As a hacker, I can read and even modify all data that is input and output by your application."
OWASP Top 10 Web Security tips: http://css.dzone.com/articles/owasp-top-10-web-security