Where the token is a handle, the attacker may attempt to guess the access token values based on knowledge they have from other access tokens.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.6.3)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
Back to the threat overview