[security] Add rate limiting to session creation and login endpoints #35
Labels
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: sneak/chat#35
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
From QA Audit (#25 comment)
Severity: SHOULD-FIX
POST /api/v1/session,POST /api/v1/register, andPOST /api/v1/loginhave no rate limiting. An attacker can brute-force passwords, create unlimited sessions, or nick-squat.Suggested fix: Add a per-IP rate limiter using
golang.org/x/time/rateor chi rate-limit middleware.