1
Most applications connect to APIs using assigned keys to get or send data.
When the API key isn't assigned, then hackers can make DDOS attacks in the servers and grab the usér's information with ease.