Open this file in your browser. This lab shows safe examples and comparisons (vulnerable vs secure patterns) -- for learning only.
--Note: Hashing on the client is just educational. Always hash + salt on server using strong parameters (bcrypt, argon2) and TLS in transit.
--This is a client-side simulation showing how string concatenation could create a dangerous query. In real servers: always use parameterized queries / ORM / prepared statements.
This simulates a site issuing a CSRF token and checking it on form submit.
--