Always make sure you restrict the permissions of your application files. Applications should not allow write and execution for other users, as it may leak data and information. Always restrict the number of users and applications that can access your application data.