Numbers generated by Math.random
are not cryptographically secure. When using random numbers in security sensitive contexts, it is recommended to go with cryptographically secure sources of randomness.
Tainted data should never be used in a cookie sent via an HTTP response object. This exposes the application to session fixation attacks.
Using tainted data in an SQL query – such as query parameters or form input supplied by a user – can leave your application vulnerable to SQL injection attacks.
Unsafe deserialization can be vulnerable to many attacks such as denial-of-service, access control, and remote code execution (RCE). Applications and APIs will be vulnerable if they deserialize hostile or tampered objects supplied by an attacker.
This can result in two primary types of attacks:
It is recommended to avoid using deserialization. To prevent using deserialization, it is always better not to accept serialized data from untrusted sources or to use serialization mediums that only permit primitive data types.
Setting webSecurity
property to false
, or allowRunningInsecureContent
to true
in an Electron renderer process like BrowserWindow
or BrowserView
disables crucial security features. By default, the webSecurity
property is always true
and the allowRunningInsecureContent
property is always false
.