Here is probably your best bet if it's a design question. If it's a specific
implementation then send it to the company in question first if you think they
have a vulnerability.
From: L. Preston Sego III
To: oauth@ietf.org
Sent: Thursday, January 31, 2013 6:
Don't want hackers to try anything on oauth2-using applications...
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
pl conf e mail account
--
Mystyle0029
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth