The document discusses security issues with rich internet applications (RIAs). It outlines four main rules: 1) never trust the browser, as client-side code can be manipulated; 2) more complex architectures introduce more opportunities for vulnerabilities; 3) client-side RIAs have a larger attack surface than server-side RIAs; and 4) all software will contain bugs, so architectures should be designed to minimize security risks from bugs. It provides examples of SQL injection, validation bypassing, and request forging to illustrate how client-side RIAs can be vulnerable if these principles are not followed.