Wrapping Up
In this chapter we looked at one of the most versatile and popular attack vectors in the enemyâs arsenalâcode injection. You should now know how to identify possible attack locations and how to properly validate user input. You also learned about minimizing possible damages by limiting access rights of your processes.
In the next chapter, weâll dig deeper into this attack vector and learn how it targets the database and what we can do to keep it safe.
Footnotes
Get Secure Your Node.js Web Application now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.