Manfred_Nowak wrote:
http://cwe.mitre.org/top25/ shows patterns of attacs.Does someone see a way to use D design patterns to stop attack patterns? -manfred
Bounds checking takes care of quite a few issues, but that's a banal thing to remark.
One more interesting thing that I see doable (and have seen done in e.g. Perl) is the @tainted attribute, which marks an untrusted string. That could help with [2], [6], [7], [9], [20].
Andrei
