Jump to content

Talk:Opa (programming language)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Divinity76 (talk | contribs) at 07:35, 3 March 2013 (XSS and Sql injection protection by having strong static typing?: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
WikiProject iconSoftware: Computing Unassessed
WikiProject iconThis article is within the scope of WikiProject Software, a collaborative effort to improve the coverage of software on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.

XSS and Sql injection protection by having strong static typing?

Opa implements strong, static typing, which can be helpful in protecting against security issues such as SQL injections and cross-site scripting attacks.[1]

are you ******* kidding me? the type system of the scripting language has absolutely nothing to do with how vulnerable the script is to SQL injection, or how vulnerable the site is to XSS (regardless of type system of the language, an unsanitized sql query is still an unsanitized sql query, and unsanitized text is still unsanitized text (that can include HTML/javasript/whatever for xss)) Divinity76 (talk) 07:35, 3 March 2013 (UTC)[reply]

  1. ^ Robertson, William; Giovanni, Vigna (2009). "Static Enforcement of Web Application Integrity Through Strong Typing". SSYM'09 Proceedings of the 18th conference on USENIX security symposium.