Skip to content
This repository


Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP

Rails plugin for overriding attr_accessible protection.

tree: 3dfeab11ef

Fetching latest commit…


Cannot retrieve the latest commit at this time

Octocat-spinner-32 lib
Octocat-spinner-32 spec inherit global trust for all nested hashes June 01, 2009
Octocat-spinner-32 tasks
Octocat-spinner-32 LICENSE initial import June 01, 2009
Octocat-spinner-32 README.rdoc
Octocat-spinner-32 Rakefile
Octocat-spinner-32 init.rb

Trusted Params

Rails plugin which assumes the params hash is dangerous unless otherwise specified.

IMPORTANT: not all of the functionality in this readme has been implemented yet.


You can install this as a plugin into your Rails app.

script/plugin install git://


This plugin does several things.

  • Disables attr_protected because you should use attr_accessible.

  • Enables attr_accessible by default (this does not allow normal mass assignment)

  • Raise an exception when assign a protected attribute

  • Adds :all as a possible option to attr_accessible to allow all attributes to be mass-assignable

  • Adds “trust” method to the params hash to bypass certain attributes


When using this plugin, you must define attr_accessible in every model to allow mass assignment. You can use :all to mark all attributes as accessible.

class Comment < ActiveRecord::Base
  attr_accessible :all

However, only do this if you want all attributes accessible to the public. Many times you will want to limit what the general public can set.

class Comment < ActiveRecord::Base
  attr_accessible :author_name, :email, :content

Now what if we have administrators who can also manage the model? They should be able to bypass the protected attributes and set anything. This can be done with the “trust” method.

def create
  params[:comment].trust if admin?
  @comment =[:comment])
  # ...

You can mark certain attributes as trusted for different roles

params[:comment].trust(:spam, :important) if moderator?

Then only those attributes will be allowed to bypass mass assignment.

Something went wrong with that request. Please try again.