SELECT * FROM users WHERE username = 'admin' AND password = '' OR '1'='1'; <script>alert('XSS Attack');</script> ; rm -rf / <img src="https://bank.com/transfer?amount=1000&to=attacker" /> function validateEmail(email) {
const regex = /^[^\s@]+@[^\s@]+\.[^\s@]+$/;
return regex.test(email);
} const cleanHTML = DOMPurify.sanitize(userInput); SELECT * FROM users WHERE username = ? AND password = ?; db.query("SELECT * FROM users WHERE username = ? AND password = ?", [username, password]); const allowedCountries = ["USA", "Canada", "Germany"];
if (allowedCountries.includes(userCountry)) {
// Разрешенное значение
} else {
// Запрещенное значение
} const phoneRegex = /^\+?\d{10,15}$/;
if (phoneRegex.test(phoneNumber)) {
// Номер телефона корректен
} $message = filter_var($_POST['message'], FILTER_SANITIZE_STRING);
$message = htmlentities($message, ENT_QUOTES, 'UTF-8'); import magic
mime_type = magic.from_file("file.jpg", mime=True)
if mime_type != "image/jpeg":
raise ValueError("Недопустимый тип файла") $filename = uniqid() . "_" . $_FILES['file']['name'];
move_uploaded_file($_FILES['file']['tmp_name'], "uploads/" . $filename);