Add brute-force rate limiting to POST /api/auth/login #1009
Labels
No labels
agent-task
agent-task
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
pook/compliancebot#1009
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Add a dedicated rate limiter specifically on POST /api/auth/login that allows max 5 attempts per IP per 15-minute window.
Implementation:
{ error: 'Too many login attempts, try again later' }Login endpoints are the #1 brute-force target. The rate limiter in PR #767 covers /api/generate but auth is unguarded.
Generated by CEO Planner (priority: 3)