Activity

Passionate about quality & testing. Looking for new roles where I have the opportunity to lead and share my love for quality.
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who update their social links on their profile. image
This badge is awarded to members who update their social links on their profile.
Richard Adams
Richard Adams
contributed:
Richard Adams
Richard Adams
contributed:
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who indicate they are open to work, writing, teaching, speaking, mentoring, CV reviewing or internships. image
This badge is awarded to members who indicate they are open to work, writing, teaching, speaking, mentoring, CV reviewing or internships.
Richard Adams
Richard Adams
contributed:
Richard Adams
Richard Adams
commented on:
I try to convince people that they have the opportunity to do something about the stuff that makes them miserable. image
"I try to convince people that they have the opportunity to do something about the stuff that makes them miserable."
<a href="https://club.ministryoftesting.com/t/86558" rel="noopener nofollow">Testing within uni software courses</a> image
Testing within uni software courses
<a href="https://www.ministryoftesting.com/talks/tools-to-help-you-with-security-testing" rel="noopener nofollow">Tools to help you with security testing</a> image
Tools to help you with security testing
Richard Adams
Richard Adams
contributed:
Strengthen your security testing by learning how simple tools can uncover vulnerabilities before attackers do. image
Strengthen your security testing by learning how simple tools can uncover vulnerabilities before attackers do.
Richard Adams
Richard Adams
is Open to Teach
Richard Adams
Richard Adams
is Open to Work
<a href="https://www.ministryoftesting.com/memories/stec-is-complete-19-modules-58-voices-and-jam-packed-portfolio-to-show-your-growth" rel="noopener nofollow">STEC is complete 🎉: 19 modules, 58 voices, and jam packed portfolio to show your growth</a> image
STEC is complete 🎉: 19 modules, 58 voices, and jam packed portfolio to show your growth
Richard Adams
Richard Adams
contributed:
Eighteen months, 19 modules, and 59 amazing contributors later, the MoT Software Testing Essentials Certification is complete!

Looking back, my favourite part has been seeing so many community m... image
Eighteen months, 19 modules, and 59 amazing contributors later, the MoT Software Testing Essentials Certification is complete! Looking back, my favourite part has been seeing so many community m...
Richard Adams
Richard Adams
is Open to Speak
<a href="https://www.ministryoftesting.com/software-testing-glossary/insecure-direct-object-reference-idor" rel="noopener nofollow">Insecure Direct Object Reference (IDOR)</a> image
Insecure Direct Object Reference (IDOR)
Richard Adams
Richard Adams
contributed:
<div>IDOR is when you can access or modify data just by tweaking the URL or API request, and the system doesn’t check whether you should be allowed to.<br><br>
</div><div>Let’s say you’re logged in as a test user, and you spot a URL that end in :<br><br>
</div><pre>orders/view/123</pre><div>That number at the end might be your order ID. But what happens if you change it to:<br><br>
</div><pre>orders/view/124</pre><div>
<br>...and suddenly you're viewing someone else’s order? Maybe you can even delete or modify it. That’s an IDOR, a lack of proper access control.<br><br>
</div><div>It’s not just websites either. You can try the same thing in APIs using tools like Postman. Change the ID in the request and see if you can grab or update someone else’s data. If you can, it means there’s no access check, and that’s a critical security flaw.<br><br>
</div> image
Definitions of Insecure Direct Object Reference (IDOR)
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who contribute a new term or an alternative definition to the software testing glossary. image
This badge is awarded to members who contribute a new term or an alternative definition to the software testing glossary.
<a href="https://www.ministryoftesting.com/software-testing-glossary/cross-site-scripting-xss" rel="noopener nofollow">Cross-Site Scripting (XSS)</a> image
Cross-Site Scripting (XSS)
Richard Adams
Richard Adams
contributed:
<div>Cross-site scripting, also known as XSS, is one of the most prevalent issues you get in web applications. It’s an issue we all need to be very wary of, as it's fairly easily discovered by attackers, but it’s also quite easy to test for. <br><br>It’s a type of vulnerability that doesn’t go after the website itself, but instead goes after the <em>user</em> of the application. It works by injecting JavaScript into an input, and that script then runs for whoever is using the page.<br><br>
</div><div>When testing, one common technique is to try and make an <strong>alert box</strong> pop; just a teeny tiny bit of JavaScript, usually something like &lt;script&gt;alert(1)&lt;/script&gt;. If you can get that to run, that means your script has executed, and you've found a cross-site scripting issue.<br><br>
</div><div>That might seem harmless, but it shows the door is open. A more skilled attacker could go on to do much worse things, like stealing cookies, hijacking sessions, redirecting users to fake websites, or stealing passwords. So even just getting the alert to show is a big red flag.<br><br>
</div><div>
<strong>Types of Cross-Site Scripting:<br></strong><br>
</div><ul>
<li>
<strong>Reflected XSS:</strong> If you can get the attack into a URL and send it to someone, like over Slack or social media, and it runs when they open it, that’s a reflected attack. </li>
<li>
<strong>Persistent XSS:</strong> If the script gets saved to the database and runs for <em>anyone</em> who visits the page, that’s a persistent attack. And that’s a really bad one, a critical issue that needs fixing immediately.<br><br>
</li>
</ul><div><strong>Top tips for testers getting started:</strong></div><ul>
<li>Start simple by trying to make an alert box pop up; it’s a safe and easy way to show that JavaScript can run.</li>
<li>Try placing your JavaScript test input in different places, like form fields or in the URLs.</li>
<li>Try saving your test input and check if it runs when other users load the page. If it does, the application might have a persistent XSS vulnerability.</li>
<li>Test reflected XSS by copying the full URL and sharing it with a friend (make sure they know you’re testing).</li>
<li>If you want to explore further, try using JavaScript to redirect the user or show a fake login screen, this helps you understand how serious the impact can be.</li>
</ul> image
Definitions of Cross-Site Scripting (XSS)
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who confirm their tickets to Leading with Quality 2025 image
This badge is awarded to members who confirm their tickets to Leading with Quality 2025
Richard Adams
Richard Adams
achieved:
This badge is awarded to a member who has given a 404 talk image
This badge is awarded to a member who has given a 404 talk
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who contribute content towards a Ministry of Testing certification. image
This badge is awarded to members who contribute content towards a Ministry of Testing certification.
<div>Thanks for getting involved on The Club this week. </div> image
Thanks for getting involved on The Club this week.&nbsp;
Richard Adams
Richard Adams
contributed:
<div>Great to watch your STEC video about tools to help with security testing. Good to see you modify field types and validation via the console to see if it's possible to exploit business logic. And I like that you share the pros and cons of the tools and approaches you describe. Glad folks have access to your cheat sheet!  </div> image
Great to watch your STEC video about tools to help with security testing. Good to see you modify field types and validation via the console to see if it's possible to exploit business logic. And I like that you share the pros and cons of the tools and approaches you describe. Glad folks have access to your cheat sheet!&nbsp;&nbsp;
Richard Adams
Richard Adams
contributed:
Richard Adams
Richard Adams
contributed:
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who confirm their tickets to TestBash Brighton 2025 image
This badge is awarded to members who confirm their tickets to TestBash Brighton 2025
<a href="https://www.ministryoftesting.com/memories/lean-coffee-at-testbash-2024" rel="noopener nofollow">Lean Coffee at TestBash 2024</a> image
Lean Coffee at TestBash 2024
Richard Adams
Richard Adams
contributed:
A group of people having a lean coffee session at TestBash 2024. image
A group of people having a lean coffee session at TestBash 2024.
Richard Adams
Richard Adams
achieved:
Earned through actions that have made the MoT Community a more pleasant and useful place to be. image
Earned through actions that have made the MoT Community a more pleasant and useful place to be.
<a href="https://www.ministryoftesting.com/p/oxygenaddict" rel="noopener nofollow">Was a professional member in 2025</a> image
Was a professional member in 2025
<a href="https://www.ministryoftesting.com/testbash-sessions/99-second-talks-day-2-at-testbash-brighton-2024" rel="noopener nofollow">99 Second Talks - Day 2 at TestBash Brighton 2024</a> image
99 Second Talks - Day 2 at TestBash Brighton 2024
<a href="https://www.ministryoftesting.com/testbash-sessions/99-second-talks-day-1-at-testbash-brighton-2024" rel="noopener nofollow">99 Second Talks - Day 1 at TestBash Brighton 2024</a> image
99 Second Talks - Day 1 at TestBash Brighton 2024
<a href="https://www.ministryoftesting.com/testbash-sessions/99-second-talks-testbash-autumn-2023" rel="noopener nofollow">99 Second Talks - TestBash Autumn 2023</a> image
99 Second Talks - TestBash Autumn 2023
<a href="https://www.ministryoftesting.com/testbash-sessions/ask-me-anything-about-security-in-testing" rel="noopener nofollow">Ask Me Anything about Security in Testing</a> image
Ask Me Anything about Security in Testing
<a href="https://www.ministryoftesting.com/testbash-sessions/exploring-security-in-day-to-day-testing" rel="noopener nofollow">Exploring Security in Day-to-day Testing</a> image
Exploring Security in Day-to-day Testing
<a href="https://www.ministryoftesting.com/testbash-sessions/let-s-go-threat-modelling" rel="noopener nofollow">Let’s Go Threat Modelling</a> image
Let’s Go Threat Modelling
<a href="https://www.ministryoftesting.com/memories/the-start-of-something" rel="noopener nofollow">The start of something!</a> image
The start of something!
<a href="https://www.ministryoftesting.com/memories/prebash-richard-adams" rel="noopener nofollow">PreBash Richard Adams</a> image
PreBash Richard Adams
<a href="https://www.ministryoftesting.com/memories/the-start-of-something" rel="noopener nofollow">The start of something!</a> image
The start of something!
<div>Richard Adams donated mot stec fee to scholarship fund.<br><br>
</div> image
Richard Adams donated mot stec fee to scholarship fund.
Richard Adams
Richard Adams
contributed:
In this episode of QA Therapy, we sit down with Richard Adams, a seasoned expert in security testing, to dive deep into the critical role security plays in modern software development. image
In this episode of&nbsp;QA Therapy, we sit down with&nbsp;Richard Adams, a seasoned expert in security testing, to dive deep into the critical role security plays in modern software development.
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who confirm their tickets to TestBash Brighton 2024 image
This badge is awarded to members who confirm their tickets to TestBash Brighton 2024
Richard Adams
Richard Adams
achieved:
This badge is awarded to members who share a photo memory from the community. image
This badge is awarded to members who share a photo memory from the community.
Richard Adams
Richard Adams
contributed:
Photo of an arm with both the ministry of testing ninja and the newer mot logo amongst other tattoos. image
Photo of an arm with both the ministry of testing ninja and the newer mot logo amongst other tattoos.
Subscribe to our newsletter
We'll keep you up to date on all the testing trends.