The goal of this paper is to formalize various processing approaches to the process of verification of the web services integrity and to show its vulnerability to many attacks.