SECURITY

Rate limiting

Every Tab endpoint has a rate limit. Limits protect the infrastructure from abuse, slow down PIN-guessing attacks, and keep one noisy integration from degrading the service for everyone else.

Limit tiers

  • Payment execution. The strictest tier — sized to plausible human spending cadence. A misconfigured bot doesn't drain a treasury here.
  • Account registration. Tight, to discourage mass handle squatting and burner-account farming.
  • Read endpoints. Loose, so a dashboard can poll and a webhook receiver can reconcile without ceremony.

What you'll see when you trip one

HTTP/1.1 429 Too Many Requests
Retry-After: 12
Content-Type: application/json

{
  "error": {
    "code": "rate_limited",
    "message": "Too many requests. Retry in 12 seconds."
  }
}

Backoff guidance

Honour Retry-After. If you'd otherwise retry in a tight loop, apply exponential backoff with a small random jitter on top so a thundering herd of your own services doesn't compound the problem.

Higher limits

Workloads that legitimately need more headroom can write in at hello@thetab.barwith the endpoint you're hitting and the steady-state rate you expect. We'll work out a custom cap that doesn't put the wider service at risk.