Hi Matt,
I’m building a custom Node.js frontend that connects (via SOAP API) to multiple ApisCP backends to provide a unified management interface for our hosting clients. Recent events (specifically the React2Shell vulnerability CVE-2025-55182) highlighted a critical architectural concern:
The Problem: If our frontend server is compromised, an attacker gains access to API keys that have full administrative access to all connected ApisCP backends. This creates a single point of catastrophic failure .
Feature Requests:
- Scoped API Keys - Is there any plan or vote for this?
- Time-Limited Tokens - API keys that expire after X hours/days, forcing rotation
- Operation Whitelisting - Specify exactly which API methods a key can call ?
I am also looking into architecture design change of my application. Building an API gateway/proxy that intercepts and filters requests, but would like to hear if there are better options available.