My two cents:

Many valuable suggestions in this thread on front ends, serving static files, 
etc.

I'd bet most of the auditors are searching for things like SQL injection 
attacks. They probably won't be able to find any of those on a 4D web server 
and most won't know enough about 4D to craft similar attacks. 

However, ...

Someone knowledgeable in 4D (a _very_ small set of people compared to those who 
are conversant in SQL) might be possible to form similar injection style 
attacks on a given codebase. At the least, with any use of php, you should 
parameterize, type check, and sanity check any input from forms, web services, 
and suchlike.

Tom Swenson 



**********************************************************************
4D Internet Users Group (4D iNUG)
Archive:  http://lists.4d.com/archives.html
Options: https://lists.4d.com/mailman/options/4d_tech
Unsub:  mailto:[email protected]
**********************************************************************

Reply via email to