Summary
It was a long journey through this chapter—by now, you will have a strong understanding of flaws, vulnerabilities, and threats and how they present a risk to your APIs. The key vulnerabilities that affect APIs include broken object-level and function-level authorization, broken authentication, data vulnerabilities, and finally, implementation and configuration vulnerabilities. Even if your API is free of vulnerabilities, it can still be abused or susceptible to business logic attacks.
While this chapter has focused on the theoretical nature of vulnerabilities, we are about to see just how easily these vulnerabilities can result in major breaches as we take a deep dive into twelve recent API breaches.