Hi @OliverRodrigues ,
thats right, thanks. In fact, it is a site where users sign up for a service, so this is the exact case. Guessing is not esay, but stealing or sending via email is possible.
The setting of a cookie via javascript could be an option but is only on the clientside. So, one could also set something in other storageplaces in the browser. But yes, can be done.
The documentation says, that request.params will also carry cookies. Will try that out 🙂
In fact, when the user really sends the data at the end, the entity is blocked from beeing shown in the portal by checking the statecode/statuscode in liquid. And unfinished signupos are deleted after a while. So, its a minimum vulnerability.
Nevertheless: good to know, that its not only me caring for data security in portals - thanks for commenting.
Have fun,
Christian