Do you know where your variables are? | |
PerlMonks |
comment on |
( [id://3333]=superdoc: print w/replies, xml ) | Need Help?? |
Nice work (although the outcome is not unexpected ;).
There are other potential security risks, though. For example if you use an ORM mapper (like DBIx::Class or Rose::DB) and construct a complicated query, you have to know exactly which arguments are parsed as SQL and which aren't. But if you really stick to plain DBI with placeholders you don't have to worry very much about SQL injection. You still have to consider possible DoS attacks, but that's usually not as bad as SQL injection. In reply to Re: Preventing SQL injection attacks: Placeholders are enough for MySQL, Postgresql and SQLite
by moritz
|
|