Idea Summary
Dynamic Actions with Ajax calls and Ajax Callback processes are highly vulnerable to hacking. A malicious user can change the data being passed to the server and no validations can fire. With DAs that execute server side code and with Ajax Callback processes a developer has to remember to code validations in validations. With Dynamic Action plug-ins, though, it is almost impossible to validate the data going in. In all cases, it would be helpful to be able to code a server side validation prior to running any Ajax calls. This is even true for a region refresh, for example. If I have a classic report that is driven by a select list (e.g. a list of employees in my department) and a hacker injects a different employee into the select list, the region may show something it should not. Of course, I should handle that in my report region source, but having a server side validation would be another way to explicitly make sure session state is not tampered with.
Use Case
All Ajax calls but especially for DA plug-ins where there is no other way to protect against session state manipulation.
Preferred Solution (Optional)
Add a server side validation attribute in the Execution section of anything that is an Ajax callback (DAs and Ajax Callback processes).
