Skip to main content

15 posts tagged with "Security"

Security updates and advisories

View All Tags

Rate Limiting That Works (Freelancer Security Part 2)

· 10 min read
STOA Team
The STOA Platform Team

You set up rate limiting: 100 requests per minute. Done, right?

Not quite. A fixed limit of 100 req/min breaks legitimate users during burst activity, lets bots abuse you with slow trickle attacks, and doesn't differentiate between your free users and your paying customers.

This is Part 2 of the series. We'll go deep on rate limiting — the strategies that work in practice.

Detecting API Attacks: Audit Logs, Guardrails, Metrics

· 8 min read
STOA Team
The STOA Platform Team

Zero Trust architecture assumes breach — if you assume attackers are already inside, your priority shifts from pure prevention to detection. STOA generates structured audit events and Prometheus metrics that enable detection of credential abuse, prompt injection attempts, rate abuse, and data exfiltration patterns. This article covers what STOA detects, how to query for attack signals, and a practical incident response playbook.

Zero Trust for API Gateways: What It Actually Means

· 9 min read
STOA Team
The STOA Platform Team

Zero Trust for API gateways means one thing: never trust, always verify — every request, regardless of network origin, must present verifiable identity and be evaluated against explicit policy before receiving access. This article explains the five Zero Trust principles and how they apply specifically to API gateway design, with concrete examples from STOA Platform's implementation.

Defense-in-Depth Security for AI-Native API Gateways

· 8 min read
STOA Team
The STOA Platform Team

STOA Platform secures AI agent API access through five independent layers: mTLS certificate binding, OAuth 2.1 with PKCE, OPA policy evaluation, AI guardrails, and immutable audit logging. Each layer addresses a distinct threat class. Compromise of any single layer does not grant unauthorized access. This article describes the security architecture, threat model, and design rationale for each layer.

OAuth 2.1 + PKCE for MCP Gateways: The Complete Flow

· 13 min read
STOA Team
The STOA Platform Team

MCP clients like Claude Desktop and GPT are public clients. They cannot store client secrets. OAuth 2.1 with PKCE (Proof Key for Code Exchange) solves this by replacing the client secret with a cryptographic proof that only the original requester could produce. This article walks through the complete OAuth flow for MCP gateways, including the discovery chain, dynamic client registration, and the production pitfalls we encountered and solved.