Confirmed users
353
edits
| Line 110: | Line 110: | ||
Based on source code inspection, there are no dangerous coding practices (like misuse of innerHTML) that will result in HTML/JS injections. | Based on source code inspection, there are no dangerous coding practices (like misuse of innerHTML) that will result in HTML/JS injections. | ||
Characters ',",>, and & | Characters ',",>, and < were tested in filenames. We could not directly test > or < because the filesystem disallowed those characters in filenames, however we did use App Manager to break into the JS and insert those characters to see if places the filenames are rendered were safe. | ||
==== Secure Communications ==== | ==== Secure Communications ==== | ||