- edited description
In section 10, the introduction sentence leaves me wondering where the additional attacks against OAuth 2.0 should also have a pointer in this sentence:
In addition to the all the security considerations discussed in OAuth
2.0 [RFC6819], the following security considerations should be taken
into account.