Questions tagged [data-validation]
The data-validation tag has no summary.
45 questions
1
vote
0
answers
45
views
Can puzzle-based data exchange enhance decentralized network security? [closed]
I'm a student and during one of my classes I came up with an idea about sharing data online. I'll say right away that I'm not an expert, but rather an amateur who wants to share my thoughts and get ...
1
vote
1
answer
211
views
How is the npm package manager made robust security-wise, what are the keys they are using, and how do they use them?
I am specifically looking at the npm package metadata like from the lodash package, the relevant part which is this:
{
"shasum": "392617f69a947e40cec7848d85fcc3dd29d74bc5",
&...
1
vote
1
answer
459
views
How can we restrict users from copying "non-allowed" file types from USB?
We blocked USB ports on most of the devices using Intune. However, a subset of users requires USB access due to their job scope which requires them to copy images from their cameras to their PCs. Is ...
2
votes
1
answer
220
views
Should I worry about excessive data forgery from my users on Firebase?
I'm getting familiar with Firebase and the firestore database.
I have a small project relying on a certain data format. It is a simple React project with direct connexion to its firestore, so no back-...
2
votes
0
answers
136
views
What are the main PII data brokers? (How do certain online companies get accurate age verification?)
A long time ago, I signed up for Apple Pay Cash. After a bit of using the service, I was asked to input my name and birthdate to continue using the service. At the time, I was underage. I input ...
0
votes
1
answer
1k
views
Django File Validation
I' m building a REST API with Django and Django Rest Framework. I allow users to upload images and videos using different subclasses of ModelSerializer. When a file is received, the server saves it to ...
0
votes
1
answer
990
views
If a file is digitally signed, is posting a hash very useful for security purposes?
In this question I asked about how to handle situations when SHA-256 hashes are not available for a file downloaded from the internet that contains executable code. Another community member ...
1
vote
2
answers
976
views
Tactics to ensure payload has not been modified
When sending a request (POST, PUT, etc). I have a security requirement to ensure that the data in the payload has not been tampered with.
In other words I need to know with certainty that the data ...
1
vote
1
answer
186
views
Need a test vector for the putty ssh-2 file mac validation
I'm trying to implement the putty file format in one of my dart packages. Implementing the actual key loading was ok, but I'm struggeling with the mac validation. I'm not shure what I'm doing wrong ...
0
votes
2
answers
169
views
How to avoid data discrepancy between multiple parties with dependent financial interests?
Generalized problem
say there are 2 companies/parties A and B (there may be more) and there is an event E which is recorded by both A and B.
Let's say the occurrences of event E according to A is 'E ...
3
votes
1
answer
164
views
Verify that data submitted by user was produced by my app
I'm designing an app (for PC), that is intended to run on users' machines and generate a file with some data. The user will then upload the file to the server, and I want to verify that this file has ...
1
vote
0
answers
872
views
Secured data upload to Aircraft over ARINC 615A
We have a requirement for Data loading function to Aircraft. There is Avionics standard termed as ARINC 615A and ARINC 665. 615A specifies high speed Ethernet based data load operation; where POINT-TO-...
0
votes
1
answer
1k
views
How does BINs vulnerabilities work?
Many companies have some BINs where you can enter a fake credit card and you get a premium account (the Credit card is based on a BIN that just trick or bypass the plateform),
I want to know how ...
39
votes
7
answers
15k
views
Is it a security vulnerability to tell a user what input characters are valid/invalid?
For input validation on a website, are there any security concerns with disclosing to the user exactly what characters are valid or invalid for a given field?
CWE-200: Information Exposure says one ...
1
vote
1
answer
5k
views
Which symbols can I whitelist to remain safe against SQL injection, XSS, and all other injections attacks?
I have an input field in a web that is being saved. This field can be shown in other systems that I do not have control over and that's why I would like to limit what is allowed in this field, ...