As a layer of security, KOR connect has a ‘rate limiter’ implemented where you can select the maximum number of requests that can be sent per second by an individual IP, that IP will be blocked if it exceeds the call number permitted by the developer such as with DoS attacks. There is also a Global rate limiter set in place to guard against distributed attacks such as DDoS attacks. This should be sufficient for most use cases but if you want a more robust approach KOR Connect also provides additional security utilizing Google’s Recaptcha as an attestation layer along with other security validations. Some more information regarding KOR Connect’s security here kor-comunity.gitlab.io/kor-connect...
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
It is good but a hacker can send bulk request to the secure url but very less know how to do this 😂😂
Looks like KOR Connect has some of their own security in place. I'd assume they would stop bulk requests.
As a layer of security, KOR connect has a ‘rate limiter’ implemented where you can select the maximum number of requests that can be sent per second by an individual IP, that IP will be blocked if it exceeds the call number permitted by the developer such as with DoS attacks. There is also a Global rate limiter set in place to guard against distributed attacks such as DDoS attacks. This should be sufficient for most use cases but if you want a more robust approach KOR Connect also provides additional security utilizing Google’s Recaptcha as an attestation layer along with other security validations. Some more information regarding KOR Connect’s security here kor-comunity.gitlab.io/kor-connect...