Hacksplaining
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance
Sign Up
Log In
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance Sign Up Log In

Information Leakage

If you accept file uploads from your users, remember to scrub any potentially sensitive meta-data as a courtesy. Be careful not to leak location or personal details in Exif tags!

Some rogue IP addresses left in template files
Lessons
Glossary
Terms and Conditions
Privacy Policy

© 2026 Hacksplaining Inc. All rights reserved. Questions? Email us at support@hacksplaining.com