2^ℵ₀ Chaotic Debt
Explosive chaos and unbounded complexity
Unbounded Social Graph Queries
Implementing social relationships using pure relational joins without considering the exponential growth of multi-hop queries. Simple adjacency list t...
Insufficient Permission Granularity in Schema
Schema designs that lack proper permission granularity, allowing broad access to data through single permission grants. This includes friend-of-friend...
API Rate Limiting and Enumeration Weakness
APIs that lack proper rate limiting, use predictable identifiers (sequential IDs), and don't verify authorization for each request. This allows attack...
Spreadsheet-as-Database Anti-pattern
Using spreadsheet applications (Excel, Google Sheets, etc.) as production databases for critical data processing. This includes hitting row/column lim...
Legacy System Brittleness
Legacy systems (often decades old) that cannot adapt to modern demands, lacking elasticity, scalability, or ability to handle unexpected load patterns...