The more points of entry you allow, the more security risks you present. Add the complexity of Ajax to the mix, and it gets harder to tell exactly where the vulnerable spots of your web application are. Read on for a concise article on preliminary checks you should run on any PHP or Ajax application to ensure you're not opening up any possible venues of attack.