This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Command Injection Defense Cheat Sheet"
From OWASP
(→WORK IN PROGRESS) |
m (→Introduction) |
||
Line 29: | Line 29: | ||
3) Safe design for features where OS interaction is intentional | 3) Safe design for features where OS interaction is intentional | ||
− | + | 3a) Like safely calling ImageMagik to do image manipulation, etc | |
3b) TBD codegen example? | 3b) TBD codegen example? |