🛡️ Sentinel: [ENHANCEMENT] Prevent DoS via long version strings #795
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR introduces a security enhancement to prevent Denial of Service (DoS) attacks via excessively long version strings.
It limits the input length to 256 characters and replaces regex validation with a more performant manual character check.
It also includes a regression test in
src/security.test.ts.PR created automatically by Jules for task 7903150395091579022 started by @srod
Summary by cubic
Prevent DoS/ReDoS from overly long version strings by capping inputs at 256 characters and replacing regex validation with a fast digit-only character check. Adds a regression test for long inputs to ensure invalid versions return false.
Written for commit 8f612bb. Summary will update on new commits.