mirror of
https://github.com/EiffelSoftware/eiffel-org.git
synced 2025-12-07 15:22:31 +01:00
Update wikipage Defending against SQL injections with EiffelStore. (Signed-off-by:javier).
git-svn-id: https://svn.eiffel.com/eiffel-org/trunk@1773 abb3cda0-5349-4a8f-a601-0c33ac3a8c38
This commit is contained in:
@@ -18,7 +18,7 @@ An SQL injection attack is a coding technique that inserts, or "injects", an SQL
|
||||
|
||||
|
||||
= Template Query =
|
||||
A template query is a string containing the fixed parts of the query and placeholders for the variable parts, and you can later substitute in values into those placeholders. (Bind variables to the query.). A template query could be static or dynamic
|
||||
A template query is a string containing the fixed parts of the query and placeholders for the variable parts, and you can later substitute in values into those placeholders. (Bind variables to the query.). A template query could be static or dynamic.
|
||||
|
||||
{{Note|the way you bind variables to the query is quite important and it will define if your query is safe and avoid a SQL Injection attack.}}
|
||||
|
||||
@@ -27,4 +27,7 @@ Variables syntax is simple: the ':' special character followed by the variable n
|
||||
|
||||
<code>SELECT * FROM TABLE_NAME WHERE field1 = :value</code>
|
||||
|
||||
{{SeeAlso| To learn more about EiffelStore query variables read the following article}}
|
||||
* [https://www.eiffel.org/doc/solutions/Query%20variables Query Variables]
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user