This project is read-only.

Only impersonate on operations that require it

J.D. Meier, Jason Taylor, Prashant Bansode, Carlos Farre, Madhu Sundararajan, Steve Gregersen.

Only impersonate specific operations that require it. If you impersonate on operations that do not require the additional privileges you are increasing your attack surface as well as the potential impact of an exploit.

Last edited Apr 17, 2008 at 12:43 AM by prashantbansode, version 1

Comments

No comments yet.