Skip to content

Apply Rate Limits to Unprotected Endpoints #164

@bigtcze

Description

@bigtcze

Description

Several public and system endpoints are currently missing Rate Limiting middleware, making them potential targets for Denial of Service (DoS) attacks.

Unprotected Endpoints identified

  1. /api/config: Public endpoint returning frontend configuration. Currently has 0 protection.
  2. /api/realtime: Real-time communication endpoint. Needs protection to prevent connection flooding.

Tasks

  1. Apply apiLimiter (or a specific publicLimiter with e.g., 60 req/min) to /api/config.
  2. Apply apiLimiter to /api/realtime routes.

Note

/api/health should remain unlimited for internal monitoring/Docker healthchecks.

Complexity

Complexity: 1/10

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions