Skip to content

Securing Shiny Apps | Part 1

Published on

Explore how defensive programming and secure coding impact Shiny applications. We also discuss the different exposure levels of a Shiny application based on public, private, or local, and begin our deep dive into secure coding guidance specific to R with Shiny, including practice input validation and protection against XSS, be cautious with file upload capabilities, and watch out for data leakage when you serve data back to your users.