aboutsummaryrefslogtreecommitdiffstats
path: root/guides
diff options
context:
space:
mode:
authorMateusz Konieczny <matkoniecz@gmail.com>2016-05-27 20:42:22 +0200
committerMateusz Konieczny <matkoniecz@gmail.com>2016-05-27 20:42:26 +0200
commit1d91d4cd7143fc188da957d2e88ef86e029d9d95 (patch)
tree173589d792974250eb9c489ece8b593f48e73f1e /guides
parent431428980ff779a9367ac94e3f43eea1335f9d83 (diff)
downloadrails-1d91d4cd7143fc188da957d2e88ef86e029d9d95.tar.gz
rails-1d91d4cd7143fc188da957d2e88ef86e029d9d95.tar.bz2
rails-1d91d4cd7143fc188da957d2e88ef86e029d9d95.zip
cometic updates to security guide - fixes #25058 [ci skip]
Diffstat (limited to 'guides')
-rw-r--r--guides/source/security.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md
index c6bc1f3878..ca985134e6 100644
--- a/guides/source/security.md
+++ b/guides/source/security.md
@@ -567,7 +567,7 @@ This is alright for some web applications, but certainly not if the user is not
Depending on your web application, there will be many more parameters the user can tamper with. As a rule of thumb, _no user input data is secure, until proven otherwise, and every parameter from the user is potentially manipulated_.
-Don't be fooled by security by obfuscation and JavaScript security. The Web Developer Toolbar for Mozilla Firefox lets you review and change every form's hidden fields. _JavaScript can be used to validate user input data, but certainly not to prevent attackers from sending malicious requests with unexpected values_. The Live Http Headers plugin for Mozilla Firefox logs every request and may repeat and change them. That is an easy way to bypass any JavaScript validations. And there are even client-side proxies that allow you to intercept any request and response from and to the Internet.
+Don't be fooled by security by obfuscation and JavaScript security. Developer tools let you review and change every form's hidden fields. _JavaScript can be used to validate user input data, but certainly not to prevent attackers from sending malicious requests with unexpected values_. The Firebug addon for Mozilla Firefox logs every request and may repeat and change them. That is an easy way to bypass any JavaScript validations. And there are even client-side proxies that allow you to intercept any request and response from and to the Internet.
Injection
---------