Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

How hackers exploit poorly built APIs – A developer’s guide to API Hardening

Breadcrumb

  • Home
  • How hackers exploit poorly built APIs – A developer’s guide to API Hardening

Suresh Vethachalam *

Engineering Manager, USA

Research Article
 
World Journal of Advanced Engineering Technology and Sciences, 2023, 10(02), 426-440.
Article DOI: 10.30574/wjaets.2023.10.2.0290
DOI url: https://doi.org/10.30574/wjaets.2023.10.2.0290

Received on 02 October 2023; revised on 21 December 2023; accepted on 28 December 2023

The use of APIs has become a central component of the development of modern software, which allows moving smoothly between services and applications. Nonetheless, low-quality APIs are highly dangerous since they tend to fall victims to hackers who find loopholes within. This article will emphasize on the general API security vulnerabilities including improper authentication, improper input validation, and absence of encryption that may expose the APIs to the vulnerability of being exploited. It also presents a developer-focused blueprint on how to protect APIs in terms of proactive security practices including appropriate access privileges, data validation, and strong encryption standards. With the consideration of real-life practical examples, the article proves the imperfection of exploiting hackers on these vulnerabilities and the ramification of not prioritising API security. It further provides useful suggestions to developers including adoption of security frameworks, frequent audits, and proper securing of API endpoints. Adhering to the rest of these best practices, developers will be able to reduce the level of risks connected to the functioning of APIs and consequently promote the overall security of their applications, which will enable them to satisfy the rising and expanding needs of contemporary software environments without putting users at risk.

API Security; Input Validation; Broken Authentication; Access Control; Rate Limiting; Data Encryption

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2023-0290.pdf

Get Your e Certificate of Publication using below link

Download Certificate

Preview Article PDF

Suresh Vethachalam. How hackers exploit poorly built APIs – A developer’s guide to API Hardening. World Journal of Advanced Engineering Technology and Sciences, 2023, 10(02), 426-440. Article DOI: https://doi.org/10.30574/wjaets.2023.10.2.0290 

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution