Skip to content

Rate Limiting Middleware #7

@CodeMaverick-143

Description

@CodeMaverick-143

Public APIs are vulnerable to abuse and DDoS attacks.

Technical Implementation:

  • Implement a Token Bucket or Leaky Bucket algorithm.
  • Store counters in memory (default) or Redis (production).
  • Add X-RateLimit-* headers to responses.
  • Configuration: windowMs, max, message.

Acceptance Criteria:

  • Requests exceeding the limit receive a 429 Too Many Requests status.
  • Headers correctly reflect remaining requests and reset time.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions