How can PHP developers implement sanitization instead of blind escaping for user input?

Blindly escaping user input can lead to security vulnerabilities such as SQL injection attacks. To implement sanitization instead, PHP developers should use functions like filter_var() or htmlentities() to remove potentially harmful characters and ensure that the input is safe to use in the application.

// Sanitize user input using filter_var()
$input = $_POST['user_input'];
$sanitized_input = filter_var($input, FILTER_SANITIZE_STRING);

// Now $sanitized_input can be safely used in the application