Skip to content

Commit 6da6f83

Browse files
committed
fixup! fixup! doc: add constraints for mem leak to threat model
1 parent b3b9bbc commit 6da6f83

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

SECURITY.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,12 @@ does not trust is considered a vulnerability:
118118
* The memory leak is directly exploitable by an untrusted source without requiring application mistakes
119119
* The leak cannot be reasonably mitigated through standard operational practices (like process recycling)
120120
* The leak occurs deterministically under normal usage patterns rather than edge cases
121-
* The leak occurs at a rate that would cause practical resource exhaustion within X requests or Y hours under
121+
* The leak occurs at a rate that would cause practical resource exhaustion within a practical timeframe under
122122
typical workloads
123+
* The attack demonstrates [asymmetric resource consumption](https://cwe.mitre.org/data/definitions/405.html),
124+
where the attacker expends significantly fewer resources than what's required by the server to process the
125+
attack. Attacks requiring comparable resources on the attacker's side (which can be mitigated through common
126+
practices like rate limiting) may not qualify
123127

124128
If Node.js loads configuration files or runs code by default (without a
125129
specific request from the user), and this is not documented, it is considered a

0 commit comments

Comments
 (0)