Sanitize your code!

Cleaning for the code

Malicious commands can be executed by reading in external data. With good analysis tools, however, potential weak points can be tracked down.

http://www.elektroniknet.de/elektronik/embedded/reinigung-fuer-den-code-151178.html