-
Notifications
You must be signed in to change notification settings - Fork 751
Description
The public web content fetching service, accessible via https://r.jina.ai/{url}, carries a potential for misuse leading to service disruption on target websites. When an attacker's resource initiates a high volume of requests to the Jina endpoint, the actual task of fetching content from the target URL (e.g., https://news.google.com/) is executed by Jina's infrastructure. This fundamentally shifts the source IP address, meaning the target website observes a massive traffic spike originating solely from Jina's crawler network, thereby masking the true origin of the high-volume request from the attacker's system. For example, if automated processes repeatedly request https://r.jina.ai/https://news.google.com/, the victim's web defenses may detect the unusual spike from Jina's IPs and implement aggressive rate limiting against that entire range, unintentionally creating a denial-of-service situation for Jina's legitimate users seeking content from that domain.