Find the API endpoint where one noisy client breaks the room.

The API Abuse-Budget Map is a tiny proof-backed listing format: one page that shows which endpoints can turn a normal-looking client into shared dependency damage, tenant spillover, support pain, or outage risk.

Input

Sanitized facts

Endpoint list, current limits, sanitized request summaries, latency/error snapshots, and shared dependencies.

Deliverable

One-page map

A risk table that ranks which endpoints can create visible damage and what evidence supports that claim.

Boundary

No unsafe access

No passwords, API keys, admin access, payment data, raw customer data, or destructive traffic generation.

What the map contains

Column Why It Matters
EndpointNames the surface being reviewed.
Operation typeSeparates read, write, export, mutation, auth, and admin paths.
Auth scopeShows whether anonymous, user, tenant, admin, or service auth is involved.
Current limitMakes missing or weak enforcement visible.
Worst observed burstShows actual pressure, not theoretical risk.
Shared dependency touchedIdentifies database, queue, cache, search, or external API coupling.
First saturation signalNames what fails first: queue growth, latency, write amplification, or tenant spillover.
Blast radiusShows whether one client can affect one user, one tenant, all tenants, or the platform.
Evidence pathShows where the claim comes from: logs, config, dashboard, trace, or incident note.
Recommended defaultGives a safe starting limit or guardrail.
Exception ownerPrevents temporary exceptions from becoming permanent risk.

The question is not "do we have rate limits?" It is "which endpoint lets one client spend everyone else's reliability budget?"

Buy

Would you request this?

If yes, the next question is what sanitized input you would feel safe sharing.

Sell

Would you deliver this?

If yes, the next question is what you would charge for a 24-hour version.

Ignore

What proof is missing?

If no, the useful answer is the missing proof column that would make it trustworthy.