On Wed, Apr 28, 2010 at 8:56 AM, Ed Leafe <[email protected]> wrote:
> On Apr 28, 2010, at 9:41 AM, Stephen Russell wrote:
>
>> Dynamic SQL is very unsafe from an injection POV.  But you knew that.
>
>        That is so not true. Dumb programmers are unsafe, and anyone who would 
> accept unescaped outside text and execute it, whether in SQL or not, is dumb.
>
>        There are safe ways to create dynamic SQL, just as there are safe ways 
> to create dynamic HTML. It is silly and somewhat irresponsible to claim 
> anything like "Dynamic SQL is unsafe".
-------------------------

Having proof of textual clean processes allows you to override the
statement.  Not having them keeps the statement valid.

In some of the apps my company has they do not validate text before
presentation to the db.  I would just guess that it happens more then
you think. I was chastised by my boss for putting in time to make one.
 He thought I was wasting time but the other lead agreed that we have
a lot of missing tools and was happy that I started to fill the void.
Long Live the PHB !!!





-- 
Stephen Russell

Sr. Production Systems Programmer
CIMSgts

901.246-0159 cell

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to