web.py has a mechanism to prevent cross-site scripting attacks, and for my application doesn't have arbitrary executables as a thing. So that leaves SQL injection to guard against. My question is, how should one go about this? I am thinking do validation on any non-general text web form fields, both in the form object and in the python code itself. For any unrestricted text fields, like passwords or comments, that can't really be validated, can't I just base-64 encode it in the python code, and store only the base-64 encoding in the db? This will increase my space requirements, but it seems pretty bulletproof to me, so I think I'm ok with that. Actually, I'd hash the passwords in the python code, so I shouldn't need to worry about password fields. The only way it might be a problem is if someone figured out a password whose hash value was an attack. That seems unlikely.

Also, are there any other major attack vectors I should guard against?

--
You received this message because you are subscribed to the Google Groups 
"web.py" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/webpy.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to