Why Unmanaged API Access is Your Biggest Blind Spot

Patrick Della Peruta
Unmanaged API Access

The recent security breach at Vercel should serve as a wake-up call for Google Workspace and IT Administrators. It highlights a vulnerability that too often flies under the radar in enterprise environments: unrestricted third-party OAuth permissions.

According to reports, an attacker compromised a third-party AI productivity tool called Context.ai. From there, they exploited a critical configuration flaw within Vercel’s enterprise Google Workspace environment. An employee had previously signed up for this AI tool using their corporate account and granted it “Allow All” OAuth permissions. Because Vercel’s internal API controls allowed users to grant these sweeping permissions without administrative oversight, the threat actor was able to seamlessly take over the employee’s Workspace account and move laterally into internal systems.

This incident was not a failure of Google’s underlying infrastructure; it was a failure of configuration. As a Google Workspace Administrator, I cannot stress this enough: leaving your API controls unmanaged is akin to handing out the master keys to your corporate data.

The Threat of Unrestricted OAuth

Employees love productivity tools, especially the current wave of AI-powered assistants. When an application prompts them with a screen asking to “Read, write, send, and delete your email” or “See, edit, create, and delete all of your Google Drive files,” users rarely hesitate before clicking “Allow.” They just want to get their work done.

If your Google Workspace environment allows users to consent to these highly privileged OAuth scopes freely, you are effectively operating with a massive shadow IT blind spot. Any compromised third-party app—or a malicious application actively masquerading as a legitimate one—gets a direct, authenticated pipeline into your organization’s sensitive data. Worse still, because this access relies on OAuth tokens, it completely bypasses traditional security perimeters like Multi-Factor Authentication (MFA) and routine password resets.

The Importance of API Controls

In a modern Zero Trust architecture, we can no longer afford to trust every application a user decides to install. Taking control of your API settings is the only way to minimize the blast radius of a third-party supply chain attack.

Google Workspace provides robust API Controls designed to let administrators govern exactly which third-party and internal applications can access Workspace data. By actively managing these controls, you ensure that corporate data is only accessed by vetted, secure, and business-justified applications.

Moving from Implicit Trust to Explicit Approval

To protect your organization from suffering a fate similar to Vercel, we strongly recommend abandoning the default “allow all” posture and enabling the App Approval feature for OAuth permissions. This shifts your environment from a model of implicit trust to explicit administrative verification.

Here is how we recommend implementing this approval workflow:

1. Restrict Access to Core Services

In the Google Admin console, navigate to Security > Access and data control > API controls. Under the “Manage Third-Party App Access” section, configure your core, data-heavy services—such as Gmail, Google Drive, and Calendar—as “Restricted.” This establishes a baseline rule: no unverified third-party app can access sensitive data without explicit admin consent.

2. Enable the User Request Workflow

Security should not bring business productivity to a grinding halt. Under the same API controls menu, turn on the feature that allows users to request access to unapproved apps. When a user attempts to log into a new, unvetted application with their Workspace account, they won’t just hit a dead end. Instead, they will be presented with an option to “Request Access” from their IT team, optionally providing a business justification.

3. Triage and Review

These user requests are funnelled directly to the Admin console. As administrators, we can review the pending requests, scrutinize the specific OAuth scopes the application is asking for, and verify the developer’s credibility. We can ask critical questions: Does a PDF reader really need the ability to send emails on the user’s behalf? Does this AI tool have a robust privacy policy?

4. Trust, Limit, or Block

Based on your security review, you can take decisive action. You can mark the application as Trusted (allowing the requesting user, and potentially others in specified Organizational Units, to use it securely), Limited (allowing access only to non-restricted scopes), or explicitly Blocked (preventing the app from ever accessing your environment).

Final Thoughts

The Vercel incident—which reportedly cascaded from a simple malware infection on a single device, through an over-privileged AI tool, and straight into a corporate Google Workspace—proves that our digital attack surfaces are more interconnected than ever.

We can no longer expect end-users to be our primary defense against malicious OAuth grants. It is our responsibility as administrators to put the guardrails in place. Review your API controls today, implement the approval workflow, and ensure your organization doesn’t become tomorrow’s headline.

Stay up to date

Stay informed with expert guidance on cloud strategy, digital transformation, and the evolving tech landscape—delivered straight to your inbox.