Introduction

In this section we will look at how assertions could have prevented some of the previous hacks seen recently.

There is a page for each hack, with a description of the hack and how assertions could have prevented it as well as a code example.