Cool, cool, and how come you cannot use `sql"insert ?", "value which can contain a ?"` like how it was designed to be used? And I hope "sanitized data" does not mean you stripped it off of "bad" characters, that's not required if you use PHP's/Nim's SQL APIs properly...
- Any way to avoid the SQL bugs and execute raw strings? Araq
- Any way to avoid the SQL bugs and execute raw strings? Clonk
- Any way to avoid the SQL bugs and execute raw string... JohnLuck
- Any way to avoid the SQL bugs and execute raw st... JohnLuck
- Any way to avoid the SQL bugs and execute ra... xbello
- Any way to avoid the SQL bugs and execu... JohnLuck
- Any way to avoid the SQL bugs and execu... shirleyquirk
- Any way to avoid the SQL bugs and execu... xbello
- Any way to avoid the SQL bugs and execu... Araq
- Any way to avoid the SQL bugs and execu... martin_2
- Any way to avoid the SQL bugs and execu... Araq
- Any way to avoid the SQL bugs and execu... martin_2
- Any way to avoid the SQL bugs and execu... Araq
- Any way to avoid the SQL bugs and execu... JohnLuck
- Any way to avoid the SQL bugs and execu... JohnLuck
- Any way to avoid the SQL bugs and execu... xbello
