The inversion is subtle. Every piece of infrastructure has things it distrusts by default and things it trusts by construction. Distrusted input gets parsed, validated, rate-limited, auth-checked. Trusted input just runs.
The pattern: an attacker moves the attack from the distrusted lane to the trusted lane. Not by breaking validation, but by compromising something further up the chain that was never modeled as hostile. Once they are riding an authorizer, the validation never fires, because the validation was built to stop outsiders and the attacker is now, in the system's view, an insider.
This is not credential theft. Credential theft is stolen credentials used for direct access. Trust inversion is bigger: the attacker captures the thing that confers legitimacy and uses it to ratify attacks across every system that downstream-trusts it. One compromise, N breaches, one for every N that trusted the mechanism.
The authorizers sit in a specific architectural position. They are upstream of the thing being protected. They typically run with broader privilege than the caller. They are deployed once and not rehardened. Nobody maps them. Security teams enumerate ports and endpoints. Nobody enumerates the things that confer legitimacy. That gap is the working surface every trust-inversion incident exploits. The fix is not better validation on the distrusted lane. The fix is recognizing that the trusted lane has an attack surface at all.