Failure to validate user input is one of the most common sources of software security vulnerabilities. When is it safe to accept user input without validation?
When the application is running behind a firewall
Never; any program that accepts input can be exploited
When the application is written in Perl using the language's "taint mode"
When the user is your own mother