In the methodology of pentesting GraphQL application, we published an article on how to discover GraphQL endpoints.
There are many engines in the GraphQL ecosystem; each one uses a different implementation, with pros and cons and other attack vectors.
Here at Escape, as a GraphQL security company, we must be