This week, a zero-day vulnerability in OAuth scope management showed exactly how fragile many integrations have become. The exploit abused overly-broad scopes to access far more data and actions than originally intended. Tokens with minimal oversight turned into full control keys. For attackers, it was simple. For defenders, it was a nightmare.
OAuth’s promise is precise permission. In practice, scope sprawl is common. Developers add wide permissions “just in case.” APIs accept them without question. Logging often fails to capture detailed scope usage. And when a new zero-day surfaces, the blast radius grows with every unused but granted permission.
This incident wasn’t about stolen passwords. It was about weaponized trust. An attacker didn’t need to guess credentials — they just found endpoints left exposed by lax scope discipline. The vulnerability lived quietly inside integrations and automation pipelines that no one thought to re-check.