this post was submitted on 11 Sep 2023
10 points (63.2% liked)

linuxmasterrace

2166 readers
1 users here now

A community for Linux enthusiasts.

May your htop stats be low and your beard grow long

Welcome to [email protected] former r/linuxmasterrace members and existing Lemmyverse citizens: Feel free to join the newly created [email protected] community.

Let’s make the full transition to the decentralized Fediverse!

founded 1 year ago
MODERATORS
 

Dont use Reddit username or Facebook username or anything like that even if it could be cool. That way you dont have to worry even if some log file or error stack trace recorded your username.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 1 year ago (3 children)

OK, I guess it's some sort of sql injection, but what does that actually does?

[–] [email protected] 5 points 1 year ago (1 children)

Not really - a SQL Injektion would be naming my user user"; DROP TABLE USERS;-- or something like that.

My string is harmless but might scare web devs: How often do you see pseudocode like this?

log(INFO, "User "+user.userID+" logged on")

Usually this should print User @[email protected] logged on as the variable content gets converted to a string. But if the variable is not a simple datatype like string, but a complex one, there might be errors. If you do the concatenation above with an object instead of a string, this would only print User [object Object] logged on. Now when the web dev sees this line he's going to try to find the Bug, where this variable gets set to the wrong value/type, when in reality it's just your carefully crafted user name.

[–] [email protected] 3 points 1 year ago
[–] [email protected] 3 points 1 year ago* (last edited 1 year ago)

Its the String representation of a Object.

If you open your Browser and hit F12, go to the console and type console.log(""+{}) you get an Object {} converted to a string by joining it with another empty string.

[–] [email protected] 1 points 1 year ago