There are a few categories of data that have instant and recognizable value. It should be clear to just about any developer that these should be treated as higher value pieces of information in any threat-modeling exercise.
Data Leaks – What Information Matters?
API Keys
API keys are typically used to provide project-level authorization for an API, service, or other organization-type object. APIs can be critical pieces of information to expose because of the extent of their permissions and the generally wider scope of API keys. A ready example of an API key might be the API key for a SaaS app, such as Twilio. A Twilio API Key doesn't differentiate access based on the role of the user; it just gives everyone who...