As the OAuth 2 framework  is becoming more and more used I thought it would be useful to share some of the most common attacks. It is important to highlight that the attacks I am going to introduce today are not issues in the specification per se but rather possible implementation issues.  The first document to look at when you try to secure one OAuth 2 implementation is the OAuth 2.0 Threat Model  but this is way not enough. In order to have a safe implementation it is important to understand what is OAuth about and to be involved in the "OAuthsphere"  (OAuth mailing list, blogs, etc),     In this blog post I will try to show two of the most common attacks that I have renamed  ' The Devil Wears Prada'  and 'Lassie Come Home'.     Let's see. Firstly the actors:    The Actors      The Devil Wears Prada   The first time I read about this potential issue was in one of John Bradley's blog post  . This issue is also known as " confused deputy problem ...