Topic Hub

API Security Hub

This topic hub is meant for teams tightening external interfaces and internal service APIs, especially where auth, inventory, and business logic are the main weak points.

Guides

18

Latest Update

May 8, 2026

Primary Intent

Curated guides on OWASP API risks, API authentication, discovery, authorization, and abuse-resistant API design.

API Security
Updated

Shadow APIs and Zombie APIs: API Discovery, Inventory, and Hidden Attack Surface Security

Learn how to find shadow APIs, track zombie APIs, build an API inventory, and reduce hidden API attack surface risk with practical API discovery and decommissioning strategies.

May 8, 2026
17 min read
Read article
API Security
Updated

OWASP API Security Top 10 Explained: BOLA, Broken Auth, SSRF and Real Attack Examples

A practical OWASP API Security Top 10 guide covering BOLA, broken authentication, excessive data exposure, SSRF, rate limiting, and real API attack examples with secure fix patterns.

May 8, 2026
22 min read
Read article
Application Security
Updated

API Authentication: JWT vs Session vs OAuth 2.0 Security Comparison

Compare JWT, server-side sessions, and OAuth 2.0 for API authentication, including security trade-offs, cookie vs token risks, and when each approach is the right fit.

May 8, 2026
16 min read
Read article
API Security

API Penetration Testing Checklist: How to Test Auth, BOLA, Rate Limits, and Business Logic

A hands-on API penetration testing guide mapped to modern API risks. Covers inventory, authentication, authorization, object-level checks, mass assignment, rate limiting, GraphQL exposure, and reporting practices with concrete abuse examples.

May 8, 2026
16 min read
Read article
AI Security

Self-Hosted LLM Security: Hardening vLLM, TGI, Ollama, and Inference APIs

Self-hosting an LLM gives you more control, but it also moves model, runtime, and network risk onto your team. This guide covers the hardening steps that matter for inference servers, private model pulls, prompt logs, and exposed GPU infrastructure.

May 7, 2026
12 min read
Read article
AI Security

LLM Gateway Security: Model Routing, Budget Controls, and Abuse Detection

An LLM gateway is not just a cost-control layer. It is the place where authentication, model policy, rate limiting, prompt controls, and provider failover need to come together. Learn how to design gateway security that does more than forward requests.

May 7, 2026
12 min read
Read article
API Security

CORS Misconfiguration: Exploitation, Examples, and Prevention Guide

Most CORS bugs start as a quick frontend fix, then quietly turn the browser into an attacker-controlled proxy. This article breaks down the mistakes that actually show up in production and how to tighten them without breaking the app.

May 3, 2026
12 min read
Read article
Penetration Testing

IDOR Hunting Guide: 10 Patterns, Real Payloads & Testing Techniques (2026)

Complete guide to finding Insecure Direct Object Reference (IDOR) vulnerabilities. Covers 10 IDOR patterns with real exploitation payloads, bypass techniques for UUID-based systems, and a systematic testing methodology used by professional pen testers.

Mar 25, 2026
25 min read
Read article
Application Security

Rate Limiting APIs: The Complete Node.js & Express Implementation Guide

Token buckets, sliding windows, Redis-backed limiters, and Cloudflare rules — every rate limiting strategy explained with production-ready code.

Mar 25, 2026
14 min read
Read article
Vulnerability Research

7 Security Mistakes Every Express.js App Makes in Production

From missing Helmet.js to unsafe deserialization — the most common security mistakes we find in Express.js applications during code reviews, with production-ready fixes.

Mar 4, 2026
14 min read
Read article
Penetration Testing

API Authentication Bypass: 6 Techniques Attackers Use (And How to Stop Them)

From JWT algorithm confusion to OAuth misconfiguration — the most common API authentication bypass techniques we find in penetration tests, with real code examples and fixes.

Feb 26, 2026
15 min read
Read article
Authentication

JWT Security: Vulnerabilities, Best Practices & Implementation Guide

Comprehensive JWT security guide covering token anatomy, common vulnerabilities, RS256 vs HS256, refresh tokens, and secure implementation patterns.

Feb 15, 2026
15 min read
Read article
AI Security

Securing Generative AI APIs: MCP Security & Shadow AI Risks in 2026

Model Context Protocol (MCP) is the emerging standard for connecting AI to tools and data. But MCP servers, shadow AI usage, and AI supply chain attacks introduce critical risks. Learn how to secure generative AI APIs.

Feb 13, 2026
19 min read
Read article
API Security

API Security Trends 2026: Protecting REST, GraphQL & gRPC in an AI-Driven World

APIs now account for 83% of web traffic. This guide covers the most critical API security trends for 2026 — AI-generated API abuse, GraphQL-specific attacks, gRPC security, API gateways, and runtime protection strategies.

Feb 7, 2026
20 min read
Read article
API Security

API Security for AI Agents: Securing MCP, Function Calling & Tool Use

AI agents are the new API consumers. This guide covers securing APIs against AI-driven abuse — MCP server hardening, function calling guardrails, tool delegation authorization, and protecting sensitive endpoints from autonomous agents.

Feb 4, 2026
18 min read
Read article
API Security

Business Logic Abuse in APIs: The Vulnerabilities Scanners Can't Find

Business logic vulnerabilities are invisible to automated scanners. From coupon stacking to loyalty fraud to race conditions, this guide covers the most exploited business logic flaws in APIs with detection strategies and prevention patterns.

Feb 3, 2026
18 min read
Read article
API Security

Secure API Design Patterns: A Developer's Guide

Learn the essential security patterns every API developer should implement, from authentication to rate limiting.

Nov 28, 2025
14 min read
Read article
API Security

GraphQL Security Vulnerabilities: The Complete Guide for 2025

GraphQL APIs introduce unique attack vectors — introspection leaks, batching attacks, query depth bombs, and authorization bypasses. Here's how to secure your GraphQL endpoints.

Jan 28, 2025
14 min read
Read article

Need a targeted review in this topic area?

These guides are designed to help teams self-educate, but the commercial value comes from applying them to a real stack, threat model, and release path.