Prevent flooding the system with multiple calls to .imaging:
A hacker would call this url incrementing "999x999" from 1 to infinite.
So that the imaging workspace would overflow or would request a high CPU usage from cropping the images.
We should configure different breakpoints (bp) and the imaging/focal point module should return the resources that equals is is just above this bp.
For example, we could configure: