You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Spammers can pass random value for the token param (ex: g-recaptcha-response) which can increase the API validation call to recaptcha, consequently incurring more cost.
Most of the Spam attacks we observed attacher sending 1-10 length chars.
It is good to have minimum length 100, validation check to avoid unnecessary API calls to recaptcha.
The text was updated successfully, but these errors were encountered:
@grosser , you are correct. The spammers are not targeting the recaptcha specifically. They are trying to exploit XSS and CSRF attacks on the form fields. But it is increasing the recaptcha cost. Also I
observer cases where the attacker try to exploit the g-recaptcha-response params with XSS payloads.
Spammers can pass random value for the token param (ex: g-recaptcha-response) which can increase the API validation call to recaptcha, consequently incurring more cost.
Most of the Spam attacks we observed attacher sending 1-10 length chars.
It is good to have minimum length 100, validation check to avoid unnecessary API calls to recaptcha.
The text was updated successfully, but these errors were encountered: