Feature: API and Gateway Rate Limiting #48
Labels
No labels
area:api
area:core
area:docs
area:infra
area:ux
dependencies
documentation
duplicate
good first issue
help wanted
invalid
question
rust
status:complete
status:partial
status:planned
type:bug
type:design
type:feature
type:infra
type:refactor
type:research
type:ux
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
icub3d/decentcom#48
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Migrated from GitHub issue icub3d/decentcom#67
Original Author: @icub3d
Original Date: 2026-04-17T00:27:46Z
Feature: Rate Limiting Research and Implementation
Overview
Implement rate limiting for the REST API and WebSocket Gateway to protect server resources and prevent abuse from automated scripts and bots.
Background
As we enable first-class bot support and open server membership, the risk of API spam and resource exhaustion increases. The current implementation has no rate limiting, allowing any client to flood the server with requests or messages.
Requirements
Retry-Afterheaders.Design (Open for Research)
API / Interface Changes
429 Too Many Requestsstatus code implementation.X-RateLimit-Limit,X-RateLimit-Remaining,X-RateLimit-Resetheaders.Data Model Changes
governorcrate) for tracking request counts.Component Changes
server/src/auth/middleware.rs: Add rate limiting layer.server/src/gateway/handler.rs: Add rate limiting to WebSocket message handling.Task List
governor,tower-rate-limit).Test List
Open Questions