Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

When data must be sent to a component in a different trusted domain, the sender must ensure that the data is suitable for the receiver's trust boundary by properly encoding and escaping any data flowing across the trust boundary. For example, if a system is infiltrated by malicious code or data, many attacks are rendered ineffective if the system's output is appropriately escaped and encoded. Refer to the guideline VOID IDS04-J. Properly encode or escape output for more details.

Capabilities

...