When a Name Like “true” Breaks iCloud: Lessons on Boolean Parsing and Input Sanitization

An Apple iCloud applicant named Rachel True was denied service and had her account locked for six months because the system mistakenly treated her surname "true" as a Boolean value, highlighting how improper input handling can trigger security defenses like SQL‑injection protection.

ITPUB
ITPUB
ITPUB
When a Name Like “true” Breaks iCloud: Lessons on Boolean Parsing and Input Sanitization

Apple iCloud Registration Failure Due to Boolean Literal “true”

When a user entered the surname true (lower‑case) in the iCloud sign‑up form, Apple’s backend parsed the value as the Boolean literal true instead of a string. The server expects the lastName field to be a string, so the type mismatch caused the registration request to be rejected and the account was automatically locked for six months as a precaution against possible SQL‑injection attacks.

Technical cause

The input handling layer does not enforce string coercion for the lastName parameter.

Unquoted identifiers that match language keywords (e.g., true, false) are interpreted according to the server’s internal query language.

When the value is treated as a Boolean, the generated SQL (or internal data model) attempts to assign a Boolean to a VARCHAR column, which fails validation.

Mitigation strategies

Quote the surname value explicitly in the request payload, e.g. "lastName": "'true'", so the parser treats it as a literal string.

Update the server‑side validation to cast all incoming lastName values to strings before constructing queries.

If the service cannot be changed, the user must modify the surname to avoid reserved keywords.

Broader implications

The incident mirrors the classic “Bobby Tables” scenario where a name containing SQL syntax ( Robert'); DROP TABLE students) can break a database if not properly sanitized. Other surnames that have caused similar failures include Root , Self , Null , and van Os . These cases demonstrate two essential security practices:

All user‑supplied text must be escaped or parameterised before inclusion in queries.

Input validation should enforce type expectations (e.g., always treat lastName as a string).

Failure to apply these safeguards can lead to false positives for injection attacks, unnecessary account lockouts, and service denial.

Reference: https://twitter.com/RachelTrue/status/1368004197166108676

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

SQL injectionbooleanprogramming pitfallsinput validationiCloudApple ID
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.