Deprecated test case
Description
Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system.
Flaws
Have any comments on this test case? Please, send us an email.