Patent attributes
Techniques described and suggested herein include various systems and methods for detecting privilege escalation vulnerabilities. A detection service may determine one or more resources of a service or application the computing resource service provider to test. The detection service may determine a set of message digests corresponding to responses to requests to access the resource of the service or application. A subset of the set of message digests associated with an identifier may be compared to determine whether an entity associated with one of the subset of message digests is able to exceed a set of privileges attributed to the entity.