No keys to the kingdom required

Manuel Karl, Marius Musch, Guoli Ma, Martin Johns, Sebastian Lekies
2022 Proceedings of the 22nd ACM Internet Measurement Conference  
Nowadays, applications expose administrative endpoints to the Web that can be used for a plethora of security sensitive actions. Typical use cases range from running small snippets of user-provided code for rapid prototyping, administering databases, and running CI/CD pipelines, to managing job scheduling on whole clusters of computing devices. While accessing these applications over the * Both authors contributed equally to this research.
doi:10.1145/3517745.3561446 fatcat:bk3idiodzna5za2kza2cvxbrey