GitHub user gauravdiamond created a discussion: Request replay attack on superset API
We are using Apache Superset, where multiple APIs are integrated within our application. However, the Superset APIs do not use a nonce or any parameter that can prevent replay attacks. We attempted to mitigate this by implementing a rate-limiting mechanism, but due to Superset’s low network latency and high request-response speed, the NGINX-level configuration is not effectively working. Could you please suggest a suitable solution to prevent replay attacks in this scenario? GitHub link: https://github.com/apache/superset/discussions/35922 ---- This is an automatically sent email for [email protected]. To unsubscribe, please send an email to: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
