logoalt Hacker News

layer8yesterday at 7:53 AM1 replyview on HN

Unvalidated input can always be an exploit vector.


Replies

Ygg2yesterday at 7:58 AM

Except in C, validation of user input can in itself be an exploit vector.

show 2 replies