[wp-hackers] WordPress 2 and Client Side Scripting

Roy Schestowitz r at schestowitz.com
Mon Nov 28 12:11:00 GMT 2005


_____/ On Sun 27 Nov 2005 18:57:02 GMT, [Amit Gupta] wrote : \_____

> Theodor Ramisch <theodor_ramisch at hotmail.com> wrote:
> |  Unfortunately I had to see that you are using custom
> |  classes to do such "common" effects. That makes
> |  plugin development harder if you have to deal
> |  with them on plugin options pages for example.
> |
> |  Why not rely on well known, stable libraries
> |  like script.aculo.us and prototype? There are
> |  a lot of developers who already worked with
> |  them and adapted to functions like "$" which
> |  replaces the document.getElementById.
>
> I'd say that learning to use the libraries that WordPress is using
> won't be that hard. I mean you learnt to use the plugin API as
> well, no? its not similar to other blogging systems if I'm not
> wrong, so why the fuss over the client-side API? its not mandatory
> afterall, you can take it as an expansion to the plugin API if you
> want & learn it if you want to make use of it in your blog, else you
> can just leave it.
>
>
> Aaron Brazell <aaron at technosailor.com> wrote:
> |  While I don't know the answer to this, I might point out that
> WordPress
> |  opted NOT to use the "common" XML-RPC libraries and by doing so,
> |  avoided having thousands of blogs vulnerable to an exploit a few
> |  weeks ago.  Mob tendencies, while often nice for developers, aren't
> |  always a good thing.
>
> yeah well, you can say that!! :) every coin has two sides. ;) using a
> commonly
> used library has its pros as well as cons!! its just a matter of
> weighing the
> pros & cons to determine the correct library!! :)

Exactly. Let's not forget that less commonly-used libraries, e.g. homebred
implementations, even with flawed security, are less unlikely to have their
vulnerabilities exploited.

There are exceptions nonetheless. There used to be many 'in-the-wild' viruses
for RISCOS despite it being a scarce minority. The platform suffered despite
claims such as the ROM-based O/S making immune to trojans. Then again, we see
cases where Sony's rootkit is maliciously 're-used' by malice. Obscurity is
valuable in the context of security.

Roy

-- 
Roy S. Schestowitz
http://Schestowitz.com



More information about the wp-hackers mailing list