From 61b3b454fc053a1b464fa3872a5b5230dfea030c Mon Sep 17 00:00:00 2001 From: Ryan Rudder <96507400+RRudder@users.noreply.github.com> Date: Thu, 27 Apr 2023 14:11:19 +1000 Subject: [PATCH] malformed android intents recommendation fix --- .../app_crash/recommendations.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/submissions/description/application_level_denial_of_service_dos/app_crash/recommendations.md b/submissions/description/application_level_denial_of_service_dos/app_crash/recommendations.md index da8e41d6..01c9b4bb 100644 --- a/submissions/description/application_level_denial_of_service_dos/app_crash/recommendations.md +++ b/submissions/description/application_level_denial_of_service_dos/app_crash/recommendations.md @@ -1,6 +1,6 @@ # Recommendation(s) -It is recommended to perform input validation to ensure that all inputs meet the expected format and content, while rejecting any malformed inputs. Input validation should consider limits to the total request, file upload, and extension sizes. It’s also important to implement exception handling so that the application gracefully handles errors without crashing. These preventative measures help against application-level DoS attacks. +It is recommended to perform input validation to ensure that all inputs, including the Intents sent to your application, meet the expected format and content while rejecting any malformed inputs. It’s also important to implement exception handling so that the application gracefully handles errors without crashing. For more information, refer to the following resources: