-
-
Notifications
You must be signed in to change notification settings - Fork 822
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
about sql injection #310
Comments
Yes, it can. Numbered or named parameters also can. Things are generally safe until you use the JavaScript's plus ( (Basically the same question was already answered in #57.) |
@Mithgol Thanks for your reply, and what is the excepted behavior if there is '1=1' in the parameter? |
I see, Thanks a lot. |
I guess the issue can be closed then. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Does the '?' can really prevent the sql injection? I`m new in sqlite3.
The text was updated successfully, but these errors were encountered: