• toddestan@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    18 hours ago

    It may not be completely crazy, depending on context. With something like a web app, if data is being sanitized in the client-side Javascript, someone malicious could absolutely comment that out (or otherwise bypass it).

    With that said, many consultant-types are either pretty clueless, or seem to feel like they need to come up with something no matter how ridiculous to justify the large sums of money they charged.

    • jj4211@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      13 hours ago

      In this case, there was file a, which is the backend file responsible for intake and sanitation. Depending on what’s next, it might go on to file b or file c. He modified file a.

      His rationale was that every single backend file should do sanitation, because at some future point someone might make a different project and take file b and pair it with some other intake code that didn’t sanitize.

      I know all about client side being useless for meaningful security enforcement.