Skip to main content

Improve the security of your GraphQL API’s - Part 1 - Complexity budget

As a GraphQL API gives you a lot of extra power and possibilities, it also introduces some new attack vectors.

For example, you have build some client applications consuming your GraphQL API. These applications are using a range of queries that you carefully created to implement the client functionality. These queries are well tested, optimized and don't stretch your datasource too much.

But nothing prevents the user of your (web) application to open the developer console and start creating and sending other queries to your GraphQL backend. By using the authentication token already available, he/she can call your API. So without further mitigations a user can create and run any query he/she can think of.

Luckily there are multiple ways to control this attack vector. In this blog series I want to share some ways on how you can improve the security of your GraphQL API's. In first post I'll focus on the concept of a complexity budget.

A single GraphQL query can potentially generate huge workload for a server, like thousands of database operations which can be used to cause DDoS attacks. By assigning a "cost" per field and then analyze the AST we can estimate the total cost of the GraphQL query. If this cost exceeds the complexity budget we have given to a user, the query is not executed.

Let me further explain this with an example. In HotChocolate the default cost of every field is 1. By using the custom @cost directive we can change this to any value we want.

If we now execute the following query, the total query cost is 17:

Field Cost
books     10
  title   1
  author 5
    name 1

In the example above, the cost calculation is done by static analysis. But sometimes the cost calculation is more dynamic. For example what if we decide to fetch a 100 items instead of the default 10?

To handle this scenario we can configure a multiplier:

As you can see we are using the take argument as a multiplier.

Limit the operational complexity

Now that we have explained the concept, let’s apply it in practice.

I typically use the code first syntax. There we could set the cost through the Cost function:

Now to limit the complexity we have to update our GraphQL configuration:

Log the operational complexity

To monitor the operational complexity, you can tweak the OpenTelemetry integration and include the AnalyzeComplexity scope:

Popular posts from this blog

.NET 8–Keyed/Named Services

A feature that a lot of IoC container libraries support but that was missing in the default DI container provided by Microsoft is the support for Keyed or Named Services. This feature allows you to register the same type multiple times using different names, allowing you to resolve a specific instance based on the circumstances. Although there is some controversy if supporting this feature is a good idea or not, it certainly can be handy. To support this feature a new interface IKeyedServiceProvider got introduced in .NET 8 providing 2 new methods on our ServiceProvider instance: object? GetKeyedService(Type serviceType, object? serviceKey); object GetRequiredKeyedService(Type serviceType, object? serviceKey); To use it, we need to register our service using one of the new extension methods: Resolving the service can be done either through the FromKeyedServices attribute: or by injecting the IKeyedServiceProvider interface and calling the GetRequiredKeyedServic...

Azure DevOps/ GitHub emoji

I’m really bad at remembering emoji’s. So here is cheat sheet with all emoji’s that can be used in tools that support the github emoji markdown markup: All credits go to rcaviers who created this list.

Kubernetes–Limit your environmental impact

Reducing the carbon footprint and CO2 emission of our (cloud) workloads, is a responsibility of all of us. If you are running a Kubernetes cluster, have a look at Kube-Green . kube-green is a simple Kubernetes operator that automatically shuts down (some of) your pods when you don't need them. A single pod produces about 11 Kg CO2eq per year( here the calculation). Reason enough to give it a try! Installing kube-green in your cluster The easiest way to install the operator in your cluster is through kubectl. We first need to install a cert-manager: kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml Remark: Wait a minute before you continue as it can take some time before the cert-manager is up & running inside your cluster. Now we can install the kube-green operator: kubectl apply -f https://github.com/kube-green/kube-green/releases/latest/download/kube-green.yaml Now in the namespace where we want t...