Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "SVG:Secure Coding"

From EGIWiki
Jump to navigation Jump to search
(Deprecate page)
Tag: Replaced
 
(8 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{svg-header}}
{{svg-header}}


If you are a developer, please make an effort to become aware of how to avoid introducing new vulnerabilities and how to write secure code
{{DeprecatedAndMovedTo|new_location=https://confluence.egi.eu/display/EGIBG/Secure+Coding}}
 
'''Valdiate input''' Don't trust user input, it could be malicious. This should include input from clients you have written, as they can be modfied to allow malicious input.
 
'''Check File permissions''' Any file or directory with world write permission could be modified with malicious content
 
'''Learn about secure programming''' Tutorials have been given at various Grid conferences and texts are available on how to avoid writing vulnerable code.
 
More information will be provided later.
 
Also see
 
* [http://www.gridpp.ac.uk/gsvg/docsguides/index.html  EGEE/GridPP  secure coding]

Latest revision as of 15:41, 21 October 2021