In general, data submitted by users should not be used directly to perform operations on the server. These data need to go through filters, which define what is valid and what is invalid, thereby eliminating unwanted data.
Clients often contain a lot of personal information, including information provided by the user to interact with the server (such as username, password, location, email address, etc.) and information about web browsing activities. of the user (history, bookmarks, etc.). When implementing, attention should be paid to preventing points that can reveal this private information.
URIs, by design, are meant to be shared with all users, and are not guaranteed to be secure. URIs are often displayed in the website's source code, and are stored in bookmarks without protection mechanisms. Therefore, it will be unsafe if the URI contains sensitive information, personal information, etc.
Avoid using the GET method to send personal information to the server, as it will be displayed in the URI. Use the POST method instead.
The User-Agent, Via, Server fields in the header usually provide information about the software used by the sender. In theory, that allows attackers to more easily exploit known vulnerabilities in these software.