diff --git a/spec/index.html b/spec/index.html index 9d0eb02..aa53779 100644 --- a/spec/index.html +++ b/spec/index.html @@ -2182,6 +2182,17 @@

Security Considerations

in [[[UNICODE-SECURITY]]] [[UNICODE-SECURITY]] and [[[RFC3987]]] [[RFC3987]] Section 8.

+

+ Comparing graphs, + querying them, + or reasoning with them, + often relies on computing (sub)graph isomorphism, + which is known to be computationally complex in the worst case. + This means that malicious graphs can be constructed to cause RDF implementations to stall or run out of memory. + Implementations processing graphs from untrusted sources are expected to provide mitigations; + examples are given in the section on Dataset Poisoning in [[RDF-CANON]]. +

+

These considerations are a more generic form of Security Considerations for [[RDF12-TURTLE]], [[RDF12-TRIG]], [[RDF12-N-TRIPLES]], and [[RDF12-N-QUADS]].