Section 30 · API & Security

Rate Limiting

Audit guide for rate limiting configuration, behavior, and documentation.

3 items 1 critical 2 recommended

This guide walks you through auditing a project's rate limiting configuration - how requests are throttled, how limits are enforced, and how consumers are informed.

The Goal: Protected Endpoints

APIs must defend themselves against abuse while remaining usable for legitimate consumers who understand the boundaries.

  • Active throttling — rate limiting at infrastructure or application level protects against abuse and DoS
  • Client isolation — limits keyed on IP, user ID, or API key so one consumer cannot exhaust limits for others
  • Graceful rejection — proper 429 responses with helpful information when limits are exceeded
  • Discoverable limits — consumers can learn limits through documentation or response headers before hitting them

Before You Start

  1. Identify infrastructure (Cloudflare, nginx, AWS API Gateway, etc.)
  2. Identify application framework (Express, Fastify, Django, Flask, etc.)
  3. Understand API architecture (REST, GraphQL, internal vs public)
  4. Check for existing rate limit libraries in dependencies