{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifqg4oki5mdt3ok6jf7hrlgvmzljbddpfg46orxghpfdbnu4cbiem",
    "uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mjesysmuxm62"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiapowpzaonulugesjj447ngflc3vipdysrr6p4bjkl2ewp6t3weee"
    },
    "mimeType": "image/jpeg",
    "size": 14261
  },
  "path": "/deprecated-endpoints-attacker-best-friend-ghost-apis/",
  "publishedAt": "2026-04-13T11:04:54.000Z",
  "site": "https://hackread.com",
  "tags": [
    "Security",
    "API",
    "Cyber Attack",
    "Cybersecurity",
    "data breach",
    "Ghost API",
    "Vulnerability"
  ],
  "textContent": "Ghost APIs are deprecated endpoints left active, exposing systems to attack. Learn how they differ from shadow APIs and why they create hidden security risks",
  "title": "Why Your Deprecated Endpoints Are an Attacker’s Best Friend: The Rise of Ghost APIs"
}