Let's say I have a website where
- PHP 5.3 is installed
- every output is
htmlspecialchars()
ed. - PDO and prepared statements are the only way to interact with the database
error_reporting()
is off- every request is passed to index.php (front controller) and no direct file access is allowed except for index.php via
.htaccess
- every input is properly escaped (why should I? i use Prepared statements, how could an user input mess up with my code?)
- there's no use of
evil()
Is it considered safe? What other things could be fixed to improve security? How could you attack it? Hack it? PHP/Server side is possible to improve security?