You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It's the caller's responsibility to ensure that a key scheme is valid and can't cause data to become confused.
67
67
68
-
Avoid using external user input directly in cache keys. For example, don't use raw strings from user interfaces as cache keys. Doing so can expose your app to security risks, such as unauthorized access or denial-of-service attacks caused by flooding the cache with random or meaningless keys. In the valid examples above, the *order* and *user preference* data are clearly separated and use trusted identifiers:
68
+
Avoid using external user input directly in cache keys. For example, don't use raw strings from user interfaces as cache keys. Doing so can expose your app to security risks, such as unauthorized access or denial-of-service attacks caused by flooding the cache with random or meaningless keys. In the preceding valid examples, the *order* and *user preference* data are clearly separated and use trusted identifiers:
69
69
70
70
*`orderid` and `userId` are internally generated identifiers.
71
71
*`region` might be an enum or string from a predefined list of known regions.
0 commit comments