Skip to main content

10. Security Considerations

CBOR implementations must consider various security aspects:

  • Resource exhaustion: Indefinite-length items and deeply nested structures can consume excessive resources
  • Invalid input handling: Decoders must properly handle malformed or invalid CBOR data
  • Numeric range: Applications must handle integers and floating-point numbers outside expected ranges
  • Map key uniqueness: Duplicate keys in maps may cause security issues
  • Tag validation: Unknown or invalid tags should be handled safely