In its current form, Tir is vulnerable to the attack described here.
Lua strings are interned. The predictability of the hashing algorithm allows to flood it with strings designed to produced collisions, which can slow down the server. You can take a server down a single client using this technique.
Since the url_parse and its POST equivalent parse everything, Tir is vulnerable to these attacks.
A solution would be to pass a table with the keys to extract from the request.