Patent attributes
A serverless computing framework is secured against malicious payload injection. A series of functions can be strung together to perform a workflow in response to a triggering event. A validator can be included with a function that verifies that an input payload originated from a trusted source. A validation value, such as a hash, can be computed based on the result payload in combination with the source code of the function that produced the result payload. A downstream function can receive the result payload and the hash and utilize the result payload and a copy of the upstream source code to produce another hash. The received and generated hashes can then be compared and utilized to control execution of the downstream function. Execution can be prevented when there is a mismatch between the hashes.