Security requirements changed for POST /crm/v3/objects/companies/batch/update
- Affected surface
- POST /crm/v3/objects/companies/batch/update
What changed
Security requirements changed for POST /crm/v3/objects/companies/batch/update Affected surface: POST /crm/v3/objects/companies/batch/update. Detected at Thu, 16 Apr 2026 14:54:16 UTC UTC.
Diff
{
"current_value": [
{
"oauth2": [
"crm.objects.companies.write"
]
}
],
"path": "POST /crm/v3/objects/companies/batch/update",
"previous_value": [
{
"app_cookie": [
"crm-public-object-api-access",
"oauth",
"oauth-access"
]
},
{
"hapikey": null
},
{
"internal_cookie": [
"crm-public-object-api-access",
"oauth",
"oauth-access"
]
},
{
"oauth2": [
"crm.objects.companies.write"
]
},
{
"private_apps": [
"crm.objects.companies.write"
]
},
{
"shhkey": null
}
]
}Likely impact
The contract still holds, but observable behavior shifted — defaults, response timing, or rate-limit shaping. Existing code keeps compiling and most calls keep working, but edge cases may differ. Worth a sanity check.
Recommended action
Re-check your auth setup against the provider's current docs. Auth changes typically require config updates, not code changes.
Related changes
Other endpoints affected by the same root cause.
Catch changes like this on every API you depend on.
Intello monitors 100+ APIs and tells you the moment something changes — before it breaks production.
