Hi, I have a method with a complicated query that doesn't map very well to Sequel's API, so I am using a raw query with Postgres bound variables, to simplify it something like
DB["SELECT * FROM people WHERE state = ?", "happy"] and I was curious if you could help me understand vulnerability to injections in this case? -- You received this message because you are subscribed to the Google Groups "sequel-talk" group. To view this discussion on the web visit https://groups.google.com/d/msg/sequel-talk/-/qXSFhSXUBmoJ. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/sequel-talk?hl=en.
