Common Pitfalls
Last updated
Last updated
Do not validate inputs coming from external sources.
An attacker can control the execution flow.
Do not validate inputs for some APIs, or sockets.
If an attacker breaches the domain, internal systems become sources of external data.
Make a query and use the data directly.
If an attacker breaches the database, it may use it to move laterally.
Using external data to call a bash command or include a file.