summaryrefslogtreecommitdiff
path: root/docs/input-filter.md
diff options
context:
space:
mode:
authorRodrigo Prado <royopa@gmail.com>2019-04-20 23:53:02 -0300
committerPeter Kokot <peterkokot@gmail.com>2019-04-21 11:06:19 +0200
commit80f3c69ae925b09068b0642306a8a14a42c7d25c (patch)
tree01110ce282f31a1176e6b562633b6ea7958a8e21 /docs/input-filter.md
parent47c5fa07102cebd3471074805a086d578c376d67 (diff)
downloadphp-git-80f3c69ae925b09068b0642306a8a14a42c7d25c.tar.gz
Updated visual text elements using markdown
Diffstat (limited to 'docs/input-filter.md')
-rw-r--r--docs/input-filter.md5
1 files changed, 3 insertions, 2 deletions
diff --git a/docs/input-filter.md b/docs/input-filter.md
index bca7f29ad2..c5307a2155 100644
--- a/docs/input-filter.md
+++ b/docs/input-filter.md
@@ -1,5 +1,4 @@
-Input Filter Support in PHP 5
------------------------------
+# Input Filter Support in PHP 5
XSS (Cross Site Scripting) hacks are becoming more and more prevalent,
and can be quite difficult to prevent. Whenever you accept user data
@@ -21,6 +20,7 @@ $_POST, $_GET and $_COOKIE arrays are only populated with stripped
data. In this simple example all I am doing is calling strip_tags() on
the data.
+```
ZEND_BEGIN_MODULE_GLOBALS(my_input_filter)
zval *post_array;
zval *get_array;
@@ -180,3 +180,4 @@ PHP_FUNCTION(my_get_raw)
RETVAL_FALSE;
}
}
+```