Antipattern: JSON.load on untrusted data

This is part of our antipatterns and cloud security series.

Per an official Ruby CVE in 2013:

JSON.load should never be given input from unknown sources. If you are processing JSON from an unknown source, always use JSON.parse.

I feel like that should be shouted from the rooftops.