Antipattern: JSON.load on untrusted data
This is part of our antipatterns and cloud security series. Per an official Ruby CVE in 2013: JSON.load should never be given input from unknown sources. If you are processing JSON from an unknown source, always use JSON.parse. I feel like that should be shouted from the rooftops.