Networks are the number 1 attack vector yet it's always difficult to communicate the risks convincingly. This is best addressed in the protocol design and security is easiest to implement when the framework has a natural solution. Limiting max request length isn't what the auditors would like.
-- You received this message because you are subscribed to the Google Groups "grpc.io" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/grpc-io/20AEAF0A-27A0-404A-875B-3B68B2C086D8%40gmail.com.
