fix: add MAX_CONTENT_LENGTH to prevent DoS via large payloads#4112
fix: add MAX_CONTENT_LENGTH to prevent DoS via large payloads#4112BossChaos wants to merge 2 commits intoScottcjn:mainfrom
Conversation
- bridge/bridge_api.py: 5MB limit - node/beacon_api.py: 2MB limit - faucet.py: 1MB limit - node/rustchain_dashboard.py: 10MB limit - node/lock_ledger.py: 1MB limit - node/gpu_render_protocol.py: 2MB limit - Prevents memory exhaustion from oversized JSON payloads
|
Closing per branch-contamination audit (2026-05-09). This PR is part of a 161-PR cluster from your account where the diff carries files unrelated to the claimed fix. Specifically, 128 of 161 PRs in this batch modify This is a branching-hygiene problem, not a quality problem with the underlying fixes. The pattern means:
To get back to paid status:
I have nothing against the underlying fixes — quality has been good when scoped. But contamination at this scale is unreviewable, and Faucet Tiers policy requires clean diffs for security claims. Specifically clean PRs already approved for payout (per 2026-05-06 audit, still scope-clean as of today):
These will be paid via the admin /wallet/transfer flow. — auto-triage 2026-05-09 (this is mechanical contamination detection, not a personal judgment) |
Security Fixes - Batch #23
1. Denial of Service via Large Payloads (6 files)
MAX_CONTENT_LENGTHaccept unlimited request body sizes