in reply to Untainting safely. (b0iler proofing?)
Basically, identify what you're going to be doing with the data, and then figure out how you're going to ensure that this untrusted data is safe.
And no matter how you approach it, don't think of your algorithm as being built to remove bad things. Build it to permit safe things. If this means doing a tr/a-zA-Z0-9_-//cd, then that's what you have to do.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re: Re: Untainting safely. (b0iler proofing?)
by Jenda (Abbot) on Jun 25, 2002 at 20:14 UTC |