About JSON and XML Threat Protection Policies
JSON and XML are prone to the same types of malicious injections, often characterized by unusual inflation of elements and nesting levels. Attackers use recursive techniques to consume memory resources. Dramatic swings in the size of the application data often signal a security problem. The JSON and XML threat protection policies help protect your applications from such intrusions.
In the event Mule Runtime fails to detect an attack, you need to monitor and design your services architecture with layers of protection in addition to these policies.
Configure and apply the JSON and XML threat protection policies using the procedures in subtopics listed below.
Reponses to these policies are:
Message successfully sent.
400 Bad Request
Any request that violates the configured limits causes a Bad Request error.