Even the best coders can make slip ups which lead to injection

The code you've posted above doesn't quite make sense to me. What i'd do is this:
PHP Code:
if (!get_magic_quotes_gpc())
{
foreach($_POST AS $postkey => $postval)
{
if(is_string($postval))
{
$_POST["$postkey"] = addslashes($postval);
}
}
}
But doesn't vB3 do all this automatically :s? You can just use the globalize function anyway to do all what I posted above. And it helps clean up strings, arrays, files and integers too