Skip to content

audit: Input validation and sanitization #37

@Snider

Description

@Snider

Security Audit: Input Validation

Audit all input handling for proper validation and sanitization.

Check For

  1. User Input - Forms, query params, headers, cookies
  2. File Uploads - Type validation, size limits, path traversal
  3. API Inputs - JSON/XML parsing, schema validation
  4. Database Queries - Parameterized queries, ORM usage
  5. Command Execution - Shell injection, argument escaping
  6. Path Handling - Directory traversal, symlink attacks
  7. URL Handling - Open redirects, SSRF
  8. Regex - ReDoS vulnerabilities
  9. Numeric Inputs - Integer overflow, type coercion
  10. Encoding - UTF-8 validation, null bytes

Questions to Answer

  • Where does untrusted input enter the system?
  • Is input validated before use?
  • Is validation allowlist or denylist based?
  • Are error messages leaking information?
  • Is there consistent validation across all entry points?

Output

Save to AUDIT-INPUT-VALIDATION.md

Include:

  • Input entry points inventory
  • Validation gaps found
  • Injection vectors discovered
  • Remediation recommendations with code examples

Metadata

Metadata

Assignees

No one assigned

    Labels

    julesFor Jules AI to work onlang:phpPHP/Laravel

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions