At the layer of MySQLdb module, it implemented the parameter filter.

On Friday, November 1, 2013 5:53:17 AM UTC+8, Claudio Dusan Vega Ozuljevich 
wrote:
>
> Hi guys! 
>
> I have this 
>
> user_input = web.input() 
>
> db.insert('table1', name=user_input.name) 
>
> to avoid things like SQL injection, is it necessary to use it like in 
> the where clause below? 
>
> db.update('table1', where="id=$id", 
>                               name=user_input.name, 
>                                vars={"id":user_input.id} 
>                   ) 
>
> or can I use just like it is with no key for name in the vars dict? 
>
>
> thanks beforehand! 
>

-- 
You received this message because you are subscribed to the Google Groups 
"web.py" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/webpy.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to