Risk: Code and infrastructure without integrity verification. Demonstrated through insecure file uploads and lack of integrity checks.
Validate uploads beyond MIME type, enforce content checks, and ensure storage isolation and antivirus scanning.
Break naive filters, then implement robust validation and isolated storage.
Content Security Policy for preview, virus scanning, and strict download handling.