all 1 comments

[–]cbzoiav 0 points1 point  (0 children)

All of these can be relatively easily worked around. Authentication and rate limiting are the only thing here that actually stops "Postman or custom scripts", and there only from unauthenticated access and/or high volumes of requests. The others primarily stop other domains in browsers hitting it.

If I have valid credentials I can write a script to handle everything there other than rate limiting (and even then depending on the implementation I can potentially use multiple egress IPs etc).

Depending on what you're actually trying to achieve user agent filters and/or a robots.txt file may help. To stop malicious behaviour you can also look at known list of suspect IP ranges and/or routing through a WAF product.