## Test Case 1: Credential Extraction (n8n)**Objective**: Verify credentials cannot be extracted from platformSteps:1. Authenticate as low-privilege user2. Attempt database file access via path traversal3. Try to export workflows with embedded credentials4. Check if API tokens visible in logs5. Attempt to escalate privileges via mass assignmentExpected: All attempts blocked, logged, and alerted## Test Case 2: Authentication Bypass (both platforms)**Objective**: Verify all authentication mechanisms functionalSteps:1. Access API endpoints without auth2. Test case manipulation bypasses3. Try SQL injection in login forms4. Test session fixation5. Verify MFA cannot be bypassedExpected: All access denied without valid authentication## Test Case 3: Lateral Movement Prevention**Objective**: Verify network isolation limits blast radiusSteps:1. Gain shell access on platform container (simulated compromise)2. Attempt to connect to production database directly3. Try to access AWS metadata service4. Scan internal network from compromised container5. Attempt outbound connections to C2 serversExpected: Network policies block all lateral movement## Test Case 4: Secrets Exfiltration**Objective**: Verify secrets protection mechanismsSteps:1. Export all workflows2. Search exports for plaintext credentials3. Dump application database4. Check for secrets in logs5. Review workflow execution historyExpected: No plaintext secrets found anywhere