From f672ebb581f32c5deb0d875c11832def284c5678 Mon Sep 17 00:00:00 2001 From: Joel Date: Thu, 11 Feb 2016 11:50:29 -0300 Subject: [PATCH] fix tip --- ...ly-attacks.md => 2016-02-11-preventing-unapply-attacks.md} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename _posts/en/{2016-xx-xx-preventing-unapply-attacks.md => 2016-02-11-preventing-unapply-attacks.md} (98%) diff --git a/_posts/en/2016-xx-xx-preventing-unapply-attacks.md b/_posts/en/2016-02-11-preventing-unapply-attacks.md similarity index 98% rename from _posts/en/2016-xx-xx-preventing-unapply-attacks.md rename to _posts/en/2016-02-11-preventing-unapply-attacks.md index 847a3dbe..de2b95b3 100644 --- a/_posts/en/2016-xx-xx-preventing-unapply-attacks.md +++ b/_posts/en/2016-02-11-preventing-unapply-attacks.md @@ -2,7 +2,7 @@ layout: post title: Preventing Unapply Attacks -tip-number: xx +tip-number: 42 tip-username: emars tip-username-profile: https://twitter.com/marseltov tip-tldr: Freeze the builtin prototypes. @@ -13,7 +13,7 @@ categories: By overriding the builtin prototypes, attackers can rewrite code to expose and change bound arguments. This can be a serious security hole that works by exploting a polyfill es5 methods. -``` +```js // example bind polyfill function bind(fn) { var prev = Array.prototype.slice.call(arguments, 1);