Use SQL real excape to prevent it, e.g. use mysql_real_escape_string in php to excape special characters to prevent SQL injection. Django also provides this security option by default.
-
Append timestamp at the end of
access_token(like this,rsa_encrypt(access_token+"|"+str(timestamp))) to protectaccess_tokenforreplay_attack -
Use digest option. Use message authentication code to verify api call, e.g.
sha256(access_token + str(timestampe)).
the best and only way that I found so far is using HTTPS protocol.
TODO