top | item 8824062

(no title)

madhurjain | 11 years ago

doh! Issue logged. Will fix it. Thanks!

discuss

order

nacs|11 years ago

As someone that has worked on a similar project before -- I should caution you that allowing POST requests and such can open up a lot more potential for abuse (comment spammers, web-mail spam, etc) so you should add some rate limiting per-visitor-IP/target-domain or something similar before implementing this.

madhurjain|11 years ago

right.. thanks for the heads up ! But since it's a self-hosted solution, it would be very easy to just circumvent the rate-limiting and use it for malicious purpose ?