logoalt Hacker News

bdcravenstoday at 3:11 PM1 replyview on HN

Isn't the same true of those who use a library that wraps SQL?


Replies

chaosharmonictoday at 4:07 PM

I would think manipulating CSS through user input is both less common as an application pattern and less critical as an attack surface.