I don't think guile-dbi does this safety check. You are welcome to add it.
Since gna.org is dead, I moved everything over to
https://github.com/opencog/guile-dbi
--linas
On Mon, Mar 27, 2017 at 1:24 PM, Christopher Allan Webber <
cweb...@dustycloud.org> wrote:
> Jakub Jankiewicz writes:
>
> >
Jakub Jankiewicz writes:
> Hi all,
>
> I want to use guile-dbi with unsafe user input. I have code like this:
>
> (dbi-query db-obj (string-append "SELECT * FROM users WHERE username = '"
> username
> "'"))
>
> How can I escape
Hi all,
I want to use guile-dbi with unsafe user input. I have code like this:
(dbi-query db-obj (string-append "SELECT * FROM users WHERE username = '"
username
"'"))
How can I escape username given from user to prevent sql