this post was submitted on 11 Sep 2023
10 points (63.2% liked)

linuxmasterrace

2051 readers
1 users here now

A community for Linux enthusiasts.

May your htop stats be low and your beard grow long

Welcome to !linuxmasterrace@feddit.de former r/linuxmasterrace members and existing Lemmyverse citizens: Feel free to join the newly created !linuxmasterrace@feddit.de community.

Let’s make the full transition to the decentralized Fediverse!

founded 1 year ago
MODERATORS
 

Dont use Reddit username or Facebook username or anything like that even if it could be cool. That way you dont have to worry even if some log file or error stack trace recorded your username.

you are viewing a single comment's thread
view the rest of the comments
[–] cows_are_underrated@feddit.de 3 points 1 year ago (3 children)

OK, I guess it's some sort of sql injection, but what does that actually does?

[–] elvith@feddit.de 5 points 1 year ago (1 children)

Not really - a SQL Injektion would be naming my user user"; DROP TABLE USERS;-- or something like that.

My string is harmless but might scare web devs: How often do you see pseudocode like this?

log(INFO, "User "+user.userID+" logged on")

Usually this should print User @someone@example.com logged on as the variable content gets converted to a string. But if the variable is not a simple datatype like string, but a complex one, there might be errors. If you do the concatenation above with an object instead of a string, this would only print User [object Object] logged on. Now when the web dev sees this line he's going to try to find the Bug, where this variable gets set to the wrong value/type, when in reality it's just your carefully crafted user name.

[–] wdx@feddit.de 3 points 1 year ago* (last edited 1 year ago)

Its the String representation of a Object.

If you open your Browser and hit F12, go to the console and type console.log(""+{}) you get an Object {} converted to a string by joining it with another empty string.

[–] churisotophu@feddit.de 1 points 1 year ago