This package can be used to stop security attacks blocking malicious request parameters.
It provides a Web based user interface to configure patterns of malicious request parameters that could be used to perform SQL injection or cross-site scripting (XSS) attacks.
A pre-defined set of attack patterns can be loaded from this package author site.
The configuration scripts can patch the scripts of the applications to be protected, so they include an agent script that is responsible detect the configured attack patterns and filter the malicious request values.
The configuration is stored in either a MySQL or a PostgreSQL database.
The protection agent script uses memcached to cache the attack pattern values in order to minimize the execution overhead of protected scripts.