Elixir has four ways to access functionality from other modules
How a “request” moves thru various phoenix layers
This is not really something I learnt this week. Just something I felt compelled to share
The following advise does not assume that your security will greatly improve. But making these minor changes will have disproportionate improvement to the security.