Antipattern: JSON.load on untrusted data

This is part of our antipatterns and cloud security series.
Per an official Ruby CVE in 2013:
JSON.load
should never be given input from unknown sources. If you are processing JSON from an unknown source, always useJSON.parse
.
I feel like that should be shouted from the rooftops.