Nice explanation of exploiting OAuth flows (“dirty-dancing”) | Dark Hacker News