Manfred_Nowak wrote:
http://cwe.mitre.org/top25/
shows patterns of attacs.

Does someone see a way to use D design patterns to stop attack patterns?

-manfred

Bounds checking takes care of quite a few issues, but that's a banal thing to remark.

One more interesting thing that I see doable (and have seen done in e.g. Perl) is the @tainted attribute, which marks an untrusted string. That could help with [2], [6], [7], [9], [20].


Andrei

Reply via email to