OWASP Top Ten Project 를 사용해서 1차 점검을 해봤다. 위험도가 높은 것 한가지가 나왔다.Attack technique used for unauthorized execution of operating system commands. This attack is possible when an application accepts untrusted input to build operating system commands in an insecure manner involving improper data sanitization, and/or improper calling of external programs 검색어 : OS Command Injection https://www.owasp.org/in..