US 12,294,581 B2
Identifying security vulnerabilities based on access control lists
Adam David Stout, Santa Clara, CA (US)
Assigned to ServiceNow, Inc., Santa Clara, CA (US)
Filed by ServiceNow, Inc., Santa Clara, CA (US)
Filed on Jun. 14, 2023, as Appl. No. 18/209,891.
Prior Publication US 2024/0422158 A1, Dec. 19, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 41/22 (2022.01)
CPC H04L 63/101 (2013.01) [H04L 41/22 (2013.01); H04L 63/105 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
obtaining a representation of an access control list (ACL), wherein the ACL includes an entry that defines user capabilities with respect to a computing resource;
determining a user class based on the entry and one or more rules, wherein the one or more rules are based on whether the computing resource is a database table for a task-based application, and wherein the one or more rules are based on whether the computing resource is read accessible or write accessible; and
providing, for display on a graphical user interface, an indication of the user class.