π‘οΈ Sentinel: Fix IP spoofing vulnerability in rate limiter #17
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
π¨ Severity: HIGH
π‘ Vulnerability: API routes were extracting client IP using
x-forwarded-fordirectly, allowing attackers to spoof IPs and bypass rate limits. Additionally, the/api/architect/plan/reviseendpoint lacked rate limiting entirely.π― Impact: Potential DoS attacks and resource exhaustion (OpenRouter API costs).
π§ Fix:
src/lib/utils/ip.tswithgetClientIphelper that prioritizesNextRequest.ip(platform secure) and safely handles headers.chat,plan, andselectroutes to usegetClientIp.reviseroute using the new utility.β Verification: Validated with
pnpm build(type check) andpnpm lint. Documentation added to.Jules/sentinel.md.PR created automatically by Jules for task 11214571060074794443 started by @lightmyfireadmin