31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
|
3. Cookies, query parameters, and POST parameters are automatically
decoded before they ever reach application code. There is no risk
that the application program will forget a decoding step or
accidently miscode a decoding operation.
4. Reply text generated using the "wapp-subst" and "wapp-trim" commands
automatically escape generated text so that it is safe for inclusion
within HTML, within a javascript string literal, as a URL, or as
the value of a query parameter. As long as the application programmer
is careful to always use "wapp-subst" and/or "wapp-trim" to generate
replies, there is little risk of injection attacks.
5. If the application is launched on a command-line with the --trim
option, then instead of running the application, Wapp scans the
application code looking for constructs that are unsafe. Unsafe
constructs include things such as using "wapp-subst" with an argument
that is not contained within {...}.
|
|
|
|
|
|
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
|
3. Cookies, query parameters, and POST parameters are automatically
decoded before they ever reach application code. There is no risk
that the application program will forget a decoding step or
accidently miscode a decoding operation.
4. Reply text generated using the "wapp-subst" and "wapp-trim" commands
automatically escape generated text so that it is safe for inclusion
within HTML, within a javascript or JSON string literal, as a URL,
or as the value of a query parameter. As long as the application
programmer is careful to always use "wapp-subst" and/or "wapp-trim"
to generate replies, there is little risk of injection attacks.
5. If the application is launched on a command-line with the --trim
option, then instead of running the application, Wapp scans the
application code looking for constructs that are unsafe. Unsafe
constructs include things such as using "wapp-subst" with an argument
that is not contained within {...}.
|