:point_up_2: :point_up_2::point_up_2:
While this thread originated literally to point out a perhaps overlooked aspect of WU, @boston85719’s tip is in the context of broader discussion about security (as alluded to in the tip’s own title). That broader discussion has been prompted by several recent–and highly valuable–tips from @georgecollier focused on elucidating techniques critical to secure app development that are addressed either not at all or insufficiently precisely in the manual. Regardless of the relative (un)importance of understanding the granular WU implications of workflow conditionals, it’s of critical importance to understand the security implications.

I think the core question to ensure is addressed in the manual both accurately and precisely is:

  • What technique(s) can a developer use to ensure that a workflow conditional is evaluated on the server, where it’s secure, instead of on (or, at least, only on) the client, where it’s subject to manipulation?

Various subquestions include:

  • For a conditional on a workflow’s event:
    • What attributes of the conditional force server-side evaluation?
    • What attributes of the event force server-side evaluation?
    • What attributes of the workflow’s actions force server-side evaluation?
  • For a conditional on an action within a workflow:
    • What attributes of the conditional force server-side evaluation?
    • What attributes of the action force server-side evaluation?
    • What attributes of the workflow’s event or its other actions force server-side evaluation?
2 Likes