Add rate limiting to Stripe webhook endpoint to prevent signature brute force #1398

Open
opened 2026-04-13 17:12:53 -04:00 by pook · 0 comments
Owner

Add rate limiting middleware to the Stripe webhook endpoint — limit to 100 requests per minute per source IP. This prevents brute-force attempts to guess webhook signatures by flooding the endpoint. Return 429 with no body when limit exceeded (do not leak rate limit details). Store counters in-memory with rolling window. Add test: send 101 rapid requests, verify 100 succeed (200/400) and 1st exceeds returns 429. This is distinct from issue #1378 which rate-limits /api/generate.


Generated by CEO Planner (priority: 3)

Add rate limiting middleware to the Stripe webhook endpoint — limit to 100 requests per minute per source IP. This prevents brute-force attempts to guess webhook signatures by flooding the endpoint. Return 429 with no body when limit exceeded (do not leak rate limit details). Store counters in-memory with rolling window. Add test: send 101 rapid requests, verify 100 succeed (200/400) and 1st exceeds returns 429. This is distinct from issue #1378 which rate-limits /api/generate. --- *Generated by CEO Planner (priority: 3)*
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
pook/compliancebot#1398
No description provided.