Skip to content

Threat Model (initial)

Assets

  • API keys, upstream internal key, usage records, model registry

Entry points

  • Public /v1/* endpoints
  • Admin /admin/* endpoints
  • Health poller calling upstreams

Risks & mitigations

  • Credential abuse: enable rate limits/concurrency caps; rotate keys; restrict IPs
  • SSRF via registry/health: validate URLs; restrict internal networks; use allowlists in production
  • CORS misconfiguration: avoid * with credentials; set allowlist
  • Leakage via logs: avoid logging request bodies; keep usage minimal
  • DoS on upstreams: breaker, TTL health, backpressure via concurrency caps

Next steps

  • Add SSO-backed admin auth; formal URL allowlist for registries; secrets management guidance.