Sicherheit: Rate-Limiting auf Server-API #75
Labels
No labels
block-planning
bug
documentation
duplicate
enhancement
feature
good first issue
help wanted
infrastructure
invalid
planning
priority:high
priority:low
question
refactoring
status:backlog
status:done
status:in-progress
status:todo
tech-decision
test
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: bollwerkadmin/bollwerk#75
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Bestandsaufnahme
Der Ktor-Server hat aktuell kein Rate-Limiting auf API-Endpoints.
Exponierte Angriffsflächen
POST /api/auth/login: Brute-Force auf Passwörter möglich – kein Schutz gegen automatisierte Login-VersuchePOST /api/messages: Spam-Nachrichten an andere User ohne LimitPUT /api/inventory: Wiederholte Full-Syncs könnten Server-Ressourcen bindenPOST /api/admin/users: Admin-Endpoint ohne Request-BegrenzungRisiken
Betroffene Stellen
Routing.ktAuthentication.ktZu klären