Open computationdoc opened 2 years ago
For those would-be black hat hackers, these databases themselves are at base configured as deployed read-only so only security risk this induces is tying up memory causing denial of service which one can do anyway to most any service. So don't bother trying to destroy the data via cypher injection. Thanks.
@computationdoc Can we close this? I don't really understand it. In any case, I think that the better approach is to document a use case and then ask us to develop an endpoint that satisfies the use case.
HIVE developers (@bherr2 ) request cypher injection API to enable rapid development of queries which will be then possibly requested as APIs - consider on test version or some such but not on prod?