Re: Prevent SQL Injection in DBI

2017-07-10 Thread Linas Vepstas
I don't think guile-dbi does this safety check. You are welcome to add it. Since gna.org is dead, I moved everything over to https://github.com/opencog/guile-dbi --linas On Mon, Mar 27, 2017 at 1:24 PM, Christopher Allan Webber < cweb...@dustycloud.org> wrote: > Jakub Jankiewicz writes: > > >

Re: Prevent SQL Injection in DBI

2017-03-27 Thread Christopher Allan Webber
Jakub Jankiewicz writes: > Hi all, > > I want to use guile-dbi with unsafe user input. I have code like this: > > (dbi-query db-obj (string-append "SELECT * FROM users WHERE username = '" > username > "'")) > > How can I escape

Prevent SQL Injection in DBI

2017-03-26 Thread Jakub Jankiewicz
Hi all, I want to use guile-dbi with unsafe user input. I have code like this: (dbi-query db-obj (string-append "SELECT * FROM users WHERE username = '" username "'")) How can I escape username given from user to prevent sql