Charting The Attack Surface Of Trigger Action Iot Platforms - Adopting A Zero Trust Approach 5 Cyber Threats To Expect