Dear Monks,
would you recommend to use Catalyst in a context where directed attacks against a web application seem likely?
To be more specific, I am going to create an application which will accept file uploads from users; then, the application will start working on the files, and eventually inform the users that the (transformed) files are ready for download. The contents of these files will be highly sensitive; attempts of industrial espionage to access them (via breaking into the system that I am going to build) would not seem unlikely.
The application shall be embedded into a nice web GUI, and, of course, there will be lots of necessary administrative functions, e.g. changing email addresses, activating or deactivating users etc. To use something like Catalyst for UI, authentication and basic managements tasks would save me the time to write another template- and data-management system.
What would you recommend? Is Catalyst mature enough to be used in such a setting? If not, is there another system that may seem suitable? Or is the best solution to code everything up manually?
Thanks,
Alexander| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |