This is why I initially hesitated to implement a streaming interface for my crypto library¹ (authenticated encryption and signatures). I eventually did it, but felt compelled to sprinkle the manual with warnings about how streaming interfaces encourage the processing of unauthenticated messages.
Now that we have a vulnerability with a name, I think I can make those warning even scarier. I'll update that manual.
Now that we have a vulnerability with a name, I think I can make those warning even scarier. I'll update that manual.
[1]: https://monocypher.org/