You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 17, 2024. It is now read-only.
This would really help in safeguarding against injection attacks -- as in this contrived example below. Where route.id could be written in a malicious way.
// Perform another account query
let accountRecordUpdated = await query(
`SELECT Id, Name, SLA__c FROM Account WHERE Id = '${route.id}'`,
oauth
)
Salesforce has a REST API to search for a resource using parameterized variables, parameterizedSearch.
https://developer.salesforce.com/docs/atlas.en-us.api_rest.meta/api_rest/resources_search_parameterized.htm
This would really help in safeguarding against injection attacks -- as in this contrived example below. Where
route.id
could be written in a malicious way.Alternatively, SOQL seems to have "bind variables" for static queries. See https://trailhead.salesforce.com/en/content/learn/modules/secdev_injection_vulnerabilities/secdev_inject_prevent_soql_injection?trail_id=security_developer
The text was updated successfully, but these errors were encountered: