Lesson 2: Build a Weak Rails app & Deploy It Come and Get It * Hardcoded Secrets * Lack of Input Validation * Code Injection Lab #2 * Trusting the User * Not Validating Input * Borrowing Code Lab #3 * Set-up and deploy in AWS Resources