This document discusses security issues with Ajax web applications. It describes how Ajax applications have a larger attack surface than traditional web applications due to additional entry points. This exposes the application to risks like information leakage through revealing internal functions, as well as risks from cross-site scripting and repudiation of requests. The document recommends approaches to secure Ajax applications.