$include_dir="/home/hyper-archives/boost/include"; include("$include_dir/msg-header.inc") ?>
Subject: [boost] [beast] Security
From: Phil Endecott (spam_from_boost_dev_at_[hidden])
Date: 2017-07-03 16:42:07
Dear All,
To what extent do we think that Beast should be "secure"? I am
thinking mostly about handling malicious input.
Has it been reviewed by anyone with specific experience of how
HTTP can be attacked? Has it been "fuzzed"?
Regards, Phil.