10. Security Considerations
CBOR implementations must consider various security aspects:
- Resource exhaustion: Indefinite-length items and deeply nested structures can consume excessive resources
- Invalid input handling: Decoders must properly handle malformed or invalid CBOR data
- Numeric range: Applications must handle integers and floating-point numbers outside expected ranges
- Map key uniqueness: Duplicate keys in maps may cause security issues
- Tag validation: Unknown or invalid tags should be handled safely