...
Data received by a component from a source outside the component's trust boundary can be malicious and can result in an injection attack, as shown in the scenario in Figure1 – Figure 1--1.
Programs must take steps to ensure that data received across a trust boundary is appropriate and not malicious. These steps can include the following:
...