Code security

Security by obscurity

SSH on any port other than 22.

SQL Injection

  1. Avoid RAW SQL in the application codebase.

  2. Avoid SQL with custom parameterization outside of ORM.

  3. Avoid hidden fields in forms. Let the server query again if required. These generally tend to skip security checks

  4. Submit HTTP forms with CSRF.

  5. Use ReCaptcha to avoid API spamming of the backend for the frontend.

User Information

The security of users’ information is one of the biggest assets for many companies. Act accordingly.


📌 Tagged As