Request Size
Goal
Prevent extremely long inputs in fields that could indicate an malicious request. Caution Some fields (ie your bio
) could contain a long text.
Enabled
Enable or disable this wire
Methods
The methods specifies which methods should be inspected
Options:
- 'post'
- 'put'
- 'patch'
- 'get'
- 'all' or '*'
The 'all' or '*' is a alias to inspect all methods
php
->methods(['post', 'put']) // only post and put method
php
->methods(['*']) // all methods
Attack score
This is this wire severity, the higher the number the more severe. All attackScores will be summarized and if it exceeds the PunishScore the block will be activated. Set this to a number that reflects the severity.
- A very high number will immediately block the user/ip
- A low number will only block if there are many requests
TIP
sqli and xss are very common attack vectors with high confidence detection. You should set those to a very high number
Tripwires
Specify the maximum size of a field in the request.
Example
php
WireDetailsConfig::make()
->enabled(true)
->methods(['*'])
->attackScore(10)
->tripwires([
'size' => 200, // max characters
]);
//... optional overrides