Exposed API keys continue to create one of the most overlooked security risks online. Stanford researchers uncovered thousands of active credentials sitting in public view, giving attackers a direct path into critical systems.

As APIs power more applications, small mistakes in credential handling now carry serious consequences.

Large-scale exposure across the web

Researchers scanned millions of websites and found nearly 2,000 valid credentials across thousands of domains. Many of these keys still worked, which means attackers could use them immediately.

The findings show a clear pattern. Developers leave sensitive credentials exposed more often than expected, and many systems fail to catch the issue.

Direct access increases the impact

API keys do more than verify access. They connect directly to services and often skip additional security checks. This makes them highly valuable to attackers.

With the right permissions, a single key can unlock data, infrastructure, or internal tools. Attackers can trigger actions, extract information, or generate costs without raising early alerts.

Even limited access can still cause real damage.

Client-side code creates ongoing risk

Developers frequently place API keys in client-side code to connect services quickly. This practice increases exposure, especially when code becomes publicly accessible.

Many teams fail to rotate or revoke keys after deployment. As a result, credentials remain active for long periods and extend the window for misuse.

This issue points to weak credential management rather than isolated mistakes.

Risk affects multiple sectors

The exposed credentials connect to cloud platforms, developer tools, and payment systems. Both small projects and large organizations appear in the findings.

Attackers can use the same method across different sectors. The broader the exposure, the greater the potential impact.

Conclusion

Exposed API keys remain a persistent and preventable threat. The study shows how easily credentials slip into public view and how much access they can provide. Organizations need to treat API key management as a core security practice, with stronger controls, regular rotation, and strict access limits.


0 responses to “Exposed API keys leave thousands of sites vulnerable”