crAPI

crAPI – Happy Path Guide

Purpose of This Document

crAPI (Completely Ridiculous API) is intentionally vulnerable, but new users often struggle to understand how the application is supposed to work before exploring security issues.

This document explains the happy path — the normal, intended workflow — so users can:


Prerequisites

Before following this guide, ensure:


Application Overview (Conceptual)

crAPI simulates a backend system for:

The happy path represents how a legitimate user interacts with the system.


Happy Path Workflow (High Level)

  1. User signs up
  2. User logs in
  3. User accesses their profile
  4. User interacts with available APIs as intended
  5. System responds with valid data and permissions

Step-by-Step Happy Path

1. User Registration

Goal: Create a new user account

This step establishes a valid user identity in the system.


2. User Login

Goal: Authenticate and obtain an access token

This token is required for all authenticated API calls.


3. Access User Profile

Goal: Verify authenticated access

This confirms authentication and authorization are working as intended.


4. Explore Available APIs

Goal: Understand normal system behavior

This step helps users recognize expected responses and permissions.


5. Normal Application Usage

Goal: Follow intended business logic

At this stage, users fully understand the baseline system behavior.


Why This Matters

Understanding the happy path allows users to:

This guide should be followed before attempting any challenges or exploitation.


Next Steps

Once the happy path is clear, users can proceed to:

to explore vulnerabilities intentionally built into crAPI.