ETS-004OAuth Weakness → Identity-Level CompromiseInadequate OAuth governance enables attackers to escalate from limited user access to tenant-wide administrative control.
ETS-006Role Misconfiguration → Privilege Escalation ChainCumulative misconfigurations in role assignments and OAuth permissions create exploitable escalation paths.