> With the ActiveRecord API as is, it’s relatively easy to write
> applications with SQL injection bugs, and those bugs don’t particularly
> stand out in code reviews.  For example,
>   Customer.where("name like "%#{params[:id]}%")
>


> While a careful security code review would likely spot this type of bug,
> there is still a significant risk that it’d be missed, in particular in an
> agile project with frequent releases that can’t afford to do an in-depth
> security review between each release.
>

It is possible to overlook user input in string interpolations - especially
if they have been given a temporary variable name, not just params[thing].
But that is one of the things Brakeman is good at detecting already:
https://github.com/presidentbeef/brakeman

-- 
Cynthia Kiser
[email protected]

-- 
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Core" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/rubyonrails-core?hl=en.

Reply via email to