Authentication Bypass vulnerability in the POST /invocations endpoint of a model inference API. The flaw occurs because the endpoint omits required API key verification. While other /v1/* endpoints properly enforce authentication, /invocations accepts inference requests without validating credentials. This misconfiguration enables unauthenticated users to invoke model completions, exposing inference features without access control.