Hmm the DBI police??

Would be nice to have a DBD report back that the 'SQL' that you entered is whacked and will take forever to run do not blame 'Perl' for poor performance.

Sounds like a good idea but at what point do you draw the line.

I guess what you can catch are SQL injection situations but do you really want to catch code like this

$dbh->do('select * from v$session where 0=1');

which is not inline scripted but looks like it??

Anyway I have a good name for it

DBI-Nanny

cheers
John Scoles

Gabor Szabo wrote:
Hi,

I have just noticed a web application I am using has embedded values
in SQL statements
instead of placeholders and it does not check the input from the user
which causes a nice
error message (including the whole SQL statement) being part of the
response page.
I reported to the site owner but I wonder how could they fix their code?

The can go over manually the whole code but it is time consuming and
error prone:
They might miss one of the statements.

I wonder if there is a way in DBI to report such usage or to even
disallow such usage
(e.g. throw an error if that is used).

I wonder if there is a tool - a plugin to Perl::Critic maybe - that
would check the
source code and report such issues?

regards
   Gabor

Reply via email to