Summary
I hope you had some fun doing some white hat hacking of Joomla!, and now have a better understanding of some common vulnerabilities in third-party Joomla! extensions. You now know why you should never ever trust user input, and always sanitize it to make sure you are actually getting the type of data that you expect. By having a better understanding of these potential vulnerabilities, you will be able to avoid silly mistakes that could potentially make your extension responsible for a Joomla! website getting hacked. You can help improve the overall reputation of the Joomla! by making security a priority. Now that you know how to keep your extensions secure, in our next chapter we will be looking at how you can package and distribute your extensions.