Authentication: As noted, likely via crypto signature or API keys. All sensitive actions require cryptographic proof of identity.
Rate Limiting: To prevent abuse, the API will have rate limits. Possibly public endpoints (like searching listings) have generous or no-key limits, but user-specific endpoints require a key and have calls/minute caps. Developers can request higher limits if building substantial apps.
Webhooks: The platform might offer webhooks for certain events (order created, order status changed, etc.) so integrations can get push notifications to their server instead of polling the API constantly.