Jump to content
MakeWebGames

Recommended Posts

Posted

i only read the 1st post but insted of showing themto secure mccodes why not just have an article on securing there coding, it would be better to teach owners rather then to show them to put 1 thing here and another here etc...

Posted
You have to understand this would be a article based on PHP security, sure we may point out flaws within the McCode script and give solutions on how to fix the flaw in question.[....]

:)

Posted
Why not get someone to secure your game, then read the codes and learn

how i learnt how to secure.

if i didnt hire anyone to secure my game, i wouldnt really know anything about security.

Posted
Ive learn all my security from people on here, but mainly Dev-Forums

dev-forums + php.net and pre made already secure scripts try a recode of the unsecure base and see what they did that you missed works well i think see something you don't know about go to php.net

Posted

McCode suffers from common PHP mistakes, which are basically mistakes of programmers not thinking about how annoying some visitors can be. The first rule for a secure website / game is NEVER TRUST USER INPUT. That simply means, check EVERY SINGLE values you receive from the net / user, including cookies, get and post. But that's not limited to avoid SQL injections or XSS (where somebody place some javascript into the text), imagine you offer a "mailbox" system where you can have private message, well don't accept the ID of the message via the GET or via POST, as it could have been changed. So check if the current user really have access to the message before showing it. And this is a just a little example.

For more details, check the web, for example: http://www.addedbytes.com/writing-secure-php/

How does that apply to McCode? well it pretty much apply to ANY website, and McCode as well. The only thing is, you will need to dig into every PHP files and see if all the parts which could be directly or indirectly modified by the users are checked. I'm sure every one of us always forget something... and this is how websites get hacked.

Posted
[...]
$_GET['ID'] = ( isset($_GET['ID']) && is_string($_GET['ID']) && ctype_digit($_GET['ID']) ) ? $_GET['ID'] : '' ;
$_POST['qty'] = ( isset($_POST['qty']) && is_string($_POST['qty']) && ctype_digit($_POST['qty']) ) ? $_POST['qty'] : '' ;
[...]

BTW, is_string() isn't needed here.

  • 6 months later...
Posted

Same as everything else, if it was done people would use it, however few are willing to put the time into making it. If you want to do something like this still then get a list of people willing to make time for it and give them all one thing to write about. Less time should mean more people are willing to help out. The only real downside would be lots of different code styles popping up in one article. If that does not work then it will be a short article, however still there for people to learn the basics.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...