OAuth scopes look simple on paper. They define what an access token can do: read, write, delete. But in production, scope assignments drift. Services evolve, permissions are reused, and what was once tight becomes wide open. If you don’t test how your systems behave under scope misconfiguration, you are