You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 16, 2021. It is now read-only.
this hasn't been a problem yet, but it's probably worth thinking about and adding some rate-limiting or throttling to prevent single IP DoS scenario.
We could also have a max queue size at anyone time that is X and when that queue limit is hit then we stop queuing scans until the queues subside. Though, this could also make it easier to DoS, so we'll need to make sure that single user limit is less than the global limit.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
this hasn't been a problem yet, but it's probably worth thinking about and adding some rate-limiting or throttling to prevent single IP DoS scenario.
We could also have a max queue size at anyone time that is X and when that queue limit is hit then we stop queuing scans until the queues subside. Though, this could also make it easier to DoS, so we'll need to make sure that single user limit is less than the global limit.
The text was updated successfully, but these errors were encountered: