<?xml-stylesheet type="text/xsl" href="https://sugarclub.sugarai.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Improving the security of files uploaded to Sugar</title><link>/dev-club/b/dev-blog/posts/improving-the-security-of-files-uploaded-to-sugar</link><description>When users can upload arbitrary files to an application, it poses a considerable security risk when those files are stored on the file system. For instance, a user might unknowingly upload a file containing an executable script by a malicious source,</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator></channel></rss>