improvement(mfa): implement MFA unlock email handling with keystore lockout mechanism#5239
Merged
victorvhs017 merged 2 commits intomainfrom Jan 23, 2026
Merged
Conversation
Collaborator
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
Contributor
Greptile SummaryThis PR implements rate-limiting for MFA unlock emails to prevent email spam when the POST Changes:
Critical Issue Found: Confidence Score: 3/5
Important Files Changed
|
…ail due to lock contention
varonix0
requested changes
Jan 23, 2026
varonix0
approved these changes
Jan 23, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Context
If the POST /api/v2/auth/mfa/verify endpoint is abused, it blocks the account, but it generates a load of emails to be sent to the user.
This PR uses the keystore lock to prevent more than one email every 5 minutes.
Steps to verify the change
Send a burst of 100 requests to /api/v2/auth/mfa/verify with an invalid
mfaToken. You should get only one email.Type
Checklist
type(scope): short description(scope is optional, e.g.,fix: prevent crash on syncorfix(api): handle null response).