Wrapping Up

In this chapter we looked at one of the most versatile and popular attack vectors in the enemy’s arsenal—code injection. You should now know how to identify possible attack locations and how to properly validate user input. You also learned about minimizing possible damages by limiting access rights of your processes.

In the next chapter, we’ll dig deeper into this attack vector and learn how it targets the database and what we can do to keep it safe.

Get Secure Your Node.js Web Application now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.