Skip to content

Commit b8cdca1

Browse files
Merge pull request #72 from hisabimbola/patch-1
fix typo
2 parents 9153200 + c9776f3 commit b8cdca1

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

03-Build/0x06-InputValidation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Following are a detailed list of vulnerabilities against which an application ca
1414

1515
## Principles
1616
### Assume every input field is vulnerable and user has malicious intention
17-
It is a good practice to assume that all the user input has malicious intention. Developer must develope a proper logic where an application can draw a boundry between malicious and trusted user input. For example, if you call an external Web service that returns strings, how do you know that malicious commands are not present? Also, if several applications write to a shared database, when you read data, how do you know whether it is safe?
17+
It is a good practice to assume that all the user input has malicious intention. Developer must develop a proper logic where an application can draw a boundry between malicious and trusted user input. For example, if you call an external Web service that returns strings, how do you know that malicious commands are not present? Also, if several applications write to a shared database, when you read data, how do you know whether it is safe?
1818

1919
### Validation should be the core part of the application
2020
Developers should consider a centralized approach to validate every input area of an application. Input validation strategy should be a core element during the development process.

0 commit comments

Comments
 (0)