GitHub user gauravdiamond created a discussion: Request replay attack on 
superset API

We are using Apache Superset, where multiple APIs are integrated within our 
application. However, the Superset APIs do not use a nonce or any parameter 
that can prevent replay attacks. We attempted to mitigate this by implementing 
a rate-limiting mechanism, but due to Superset’s low network latency and high 
request-response speed, the NGINX-level configuration is not effectively 
working. Could you please suggest a suitable solution to prevent replay attacks 
in this scenario?

GitHub link: https://github.com/apache/superset/discussions/35922

----
This is an automatically sent email for [email protected].
To unsubscribe, please send an email to: 
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to