Answer:
Attackers can misuse exposed API keys to impersonate authorized users and gain unauthorized access to application logic.
Attackers can misuse exposed API keys to impersonate authorized users and gain unauthorized access to application logic.
You may be interested in:
Web Security MCQs - PART 2