• Check all Administer permissions • Administer filter can take over a site • Use update.module • Have you visit or subscribe to drupal security page? • Avoid any kind of PHP input, wrote your own modules instead of • Watch your input formats
In SQL-Injection we exploited the vulnerability by injecting SQL Queries as user inputs. In XSS, we inject code (basically client side scripting) to the remote server.
check_markup() to format text to HTML filter_xss() to filter text to HTML filter_xss_admin() to filter admin text to HTML node_view($node) instead of $node- >body
with POST submissions by default (makes it harder) Form API includes form tokens, requires form retrieval before submission, checks valid values drupal_valid_token() provided to generate/ validate tokens for GET requests