- We're hitting the Big Time, in terms of usage
- We need to make sure we're doing things right
- I'm creating a list of every reference to $_GET and $_POST in the core and core modules, and checking that they're not used in a way that could be exploited through a parameter-injection attack.
- I'm going through every call to $db->Execute or $db->SelectLimit, and making sure all query strings are properly parameterized to avoid SQL-injection attacks.
- I'll be looking at every admin page to confirm that it calls check_login() to prevent any unprivileged users from gaining access.
I think there may need to be similar audits on the use of the $param hash, but I'm not sure exactly what will need to be done there.
In any case, I'll report back here. Again, I invite suggestions!
Thanks,
___Samuel___