NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.
All the Perl that's Practical to Extract and Report
Stories, comments, journals, and other submissions on use Perl; are Copyright 1998-2006, their respective owners.
DBI and TaintIn (Score:2)
Re: (Score:2)
--
xoa
Re: (Score:1)
Actually I find
TaintInbarely useful. I use bind parameters for any user input being put into the database, so there’s no way to do damage there. ButTaintOutis very important, because it helps XSS-proofing the code.Re: (Score:2)
It's an issue of philosophy, not practicality. You shouldn't be putting anything tainted into a database, where it becomes untainted. It's a big reminder.
--
xoa
Re: (Score:1)
It’s an issue of philosophy alright. In my case, I prefer to preserve pristine copies of all user input. Lossy destructive modification is evil: it destroys all possibility to investigate the original data in the future, or re-munge it if your algorithms happen to change.
So if I get as far as committing the data to storage, then it’ll be unmodified, meaning I’ll have to scrub/disarm/convert it when I pull it out. This stance makes
TaintInpretty pointless; only if I wanted to optionallyRe: (Score:2)
Who said "lossy destructive"? I'm just suggesting using taint mode as a seat belt to remind you "hey, you haven't validated this data field before you slam it into the database."
--
xoa
Re: (Score:2)
One of my favorite topics. (Score:1)