diff --git a/rfc/src/sharing.xml b/rfc/src/sharing.xml
index 054740b..0271d7e 100644
--- a/rfc/src/sharing.xml
+++ b/rfc/src/sharing.xml
@@ -408,6 +408,10 @@ for this Principal that the user has access to, or null if none.
Sharing data with another user allows someone to turn a transitory account compromise (e.g., brief access to an unlocked or logged-in client) into a persistent compromise (by setting up sharing with a user that is controlled by the attacker). This can be mitigated by requiring further authorisation for configuring sharing, or sending notifications to the sharer via another channel whenever a new sharee is added.
+Denial of Service
+By creating many changes to the sharing status of objects, a user can cause many ShareNotifications to be generated, which could lead to resource exhaustion. Servers can mitigate this by coalescing multiple changes to the same object into a single notification, limiting the maximum number of notifications it stores per user, and/or rate limiting the changes to sharing permissions in the first place. Automatically deleting older notifications after reaching a limit can mean the user is not made aware of a sharing change, which can itself be a security issue. For this reason, it is better to coalesce changes and use other mitigation strategies.
+
+
Unauthorised Principals
The set of Principals within a shared environment MUST be strictly controlled. If adding a new Principal is open to the public, risks include: