🔴 [P0] Add rate limiting to all federation endpoints (DoS vulnerability) #272

Closed
opened 2026-02-03 22:29:17 +00:00 by jason.woltje · 0 comments
Owner

Summary

No rate limiting exists on ANY federation endpoint. Public endpoints completely unprotected against DoS attacks.

Security Impact

  • Connection flood attacks
  • Command spam attacks
  • Agent spawn abuse
  • Signature verification DoS (expensive RSA operations)
  • Database exhaustion

Required Implementation

  1. Install @nestjs/throttler package
  2. Configure global throttler module
  3. Apply @Throttle() decorators to all endpoints
  4. Different limits per endpoint (10-100/minute)

Files Affected

All controllers in apps/api/src/federation/

Priority

CRITICAL (P0) - Blocks production deployment

## Summary No rate limiting exists on ANY federation endpoint. Public endpoints completely unprotected against DoS attacks. ## Security Impact - Connection flood attacks - Command spam attacks - Agent spawn abuse - Signature verification DoS (expensive RSA operations) - Database exhaustion ## Required Implementation 1. Install `@nestjs/throttler` package 2. Configure global throttler module 3. Apply `@Throttle()` decorators to all endpoints 4. Different limits per endpoint (10-100/minute) ## Files Affected All controllers in `apps/api/src/federation/` ## Priority **CRITICAL (P0)** - Blocks production deployment
jason.woltje added the securityp0apiapi labels 2026-02-03 22:29:17 +00:00
jason.woltje added this to the M7.1-Remediation (0.0.8) milestone 2026-02-03 22:31:44 +00:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: mosaic/stack#272