Description
Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system.
Flaws
Test Suites
Have any comments on this test case? Please, send us an email.