Wapp

Diff
Login

Differences From Artifact [7071615e6b]:

To Artifact [5776ee6a48]:


31
32
33
34
35
36
37
38
39
40
41




42
43
44
45
46
47
48
31
32
33
34
35
36
37




38
39
40
41
42
43
44
45
46
47
48







-
-
-
-
+
+
+
+







  3.  Cookies, query parameters, and POST parameters are automatically
      decoded before they ever reach application code. There is no risk
      that the application program will forget a decoding step or
      accidently miscode a decoding operation.

  4.  Reply text generated using the "wapp-subst" and "wapp-trim" commands
      automatically escape generated text so that it is safe for inclusion
      within HTML, within a javascript string literal, as a URL, or as
      the value of a query parameter. As long as the application programmer
      is careful to always use "wapp-subst" and/or "wapp-trim" to generate
      replies, there is little risk of injection attacks.
      within HTML, within a javascript or JSON string literal, as a URL,
      or as the value of a query parameter. As long as the application
      programmer is careful to always use "wapp-subst" and/or "wapp-trim"
      to generate replies, there is little risk of injection attacks.

  5.  If the application is launched on a command-line with the --trim
      option, then instead of running the application, Wapp scans the
      application code looking for constructs that are unsafe.  Unsafe
      constructs include things such as using "wapp-subst" with an argument
      that is not contained within {...}.