Skip to content

Prepared Statements or other SQL Injection Countermeasures? #1330

Closed Answered by infogulch
TimerErTim asked this question in Q&A
Discussion options

You must be logged in to vote

Please never use your language's formatting tools and manual replacements to pass parameters to a text-based query statement processor. Always [pass] parameters [via client library API]! Surrealdb [client libraries] support parameters [1]. If your query processor's [client library] API does not support parameters then it should instantly be deranked to "not a serious tool".

[1] https://surrealdb.com/docs/surrealql/parameters - see "Defining parameters within client libraries"

Replies: 2 comments 5 replies

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
5 replies
@TimerErTim
Comment options

@infogulch
Comment options

@TimerErTim
Comment options

@infogulch
Comment options

@naisofly
Comment options

Answer selected by TimerErTim
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants