-
Notifications
You must be signed in to change notification settings - Fork 123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docs could include more advice on securing apps #118
Comments
Where do you see XSS? When I talk about SQL injection I mean the methods in the model module that escape the values passed before building the query to pass to the db module. (or not) |
Ah, I thought you meant user input being used as-is in the resulting HTML... |
Can this issue be closed? PS: you might want to open another because I heard Robotnik is back in the Emerald Hill :) |
@felipedaragon idk if you know this but putting an username in a webpage without escaping HTML elements = XSS, e.g. let's say the username is Nothing in the README seems to indicate |
@SoniEx2 are you suggesting the creation of a special readme with basic secure coding tips for Sailor users? Some years ago I wrote an article about a dozens of similar scenarios, not just covering XSS but other potential issues: http://seclists.org/fulldisclosure/2014/May/128 |
I'm suggesting the README should warn about XSS, as it's relevant to the given example. |
@SoniEx2 @Etiene here is an example of how another framework (Django) tackled this in their documentation: https://docs.djangoproject.com/en/1.9/topics/security/ |
This part of the README talks about SQL injection https://github.com/sailorproject/sailor/blob/master/README.md#creating-pages
but I only see XSS.
The text was updated successfully, but these errors were encountered: