- Validate input from all untrusted data sources. Proper input validation can eliminate the vast majority of software vulnerabilities. Be suspicious of most external data sources, including commandline arguments, network interfaces, environmental variables, and user controlled files.
Compile code using the highest warning level available for your compiler and eliminate warnings by modifying the code [[C MSC00-A], [C++ MSC00-A] ].
References
- Seacord 05 Chapter 8.8 Recommended Practices