From 223d0dbf0b4fd3042d657d4d671f3a21453e845f Mon Sep 17 00:00:00 2001
From: Max Schaefer
Never decide whether to authenticate a user based on data that may be controlled by that user. If necessary, ensure that the data is validated extensively when it is input before any authentication checks are performed. -
-+
+It is still possible to have a system that "remembers" users, thus not requiring the user to login on every interaction. For example, personalization settings can be applied without authentication because this is not sensitive information. However, users -should be allowed to take sensitive actions only when they have been fully authenticated. +should be allowed to take sensitive actions only when they have been fully authenticated. +
The following example shows a comparison where an user controlled expression is used to guard a sensitive method. This should be avoided.: -
+