Internal APIs Are Easy to Exploit Without Workload Identity

Dec 22, 2025

Failure Pattern

Internal APIs assume internal traffic is safe. Attackers compromise internal workloads and abuse these trusted API channels.

 

What We See in the Field

A compromised service calls privileged internal APIs. The APIs accept requests because they originate from trusted networks. Attackers escalate privileges or extract sensitive data.

 

Underlying Causes

Overtrust in internal origins
No identity binding for API requests
Shared service credentials
Broad internal API permissions
Metadata-based trust models

 

Trust-Native Network Resolution

DTL requires API clients to present cryptographic identity. Internal API calls must originate from workloads with verified TrustKeys.

 

Broken Trust Assumption

The attacks that exposed this failure pattern were not stealthy break-ins. They were trusted operations.

During incidents such as SolarWinds, Capital One, and Okta, malicious activity was carried out using valid identities and approved execution paths. Certificates were valid. Tokens were accepted. Sessions were authenticated. From the system’s point of view, nothing appeared wrong.

This is the risk of trust inferred from credentials, location, or prior authentication.