Protecting Your Data: How to Avoid API Endpoint Vulnerabilities