You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Our Fortify scans alerted us to possible SQL injection attacks in sqldict.py, and upon inspection it does appear to have a number of SQL statements built with Python's string-building %s feature rather than sqlite's parameterized queries.
Is that something that can be fixed? It's giving our cyber team fits. =)
-Rob
The text was updated successfully, but these errors were encountered:
I’m trying to remember what we decided. I think that the places where there are not parameterized queries are only function calls that a developer would make with this or that string as an argument — and the developer already has complete control anyway.
So there’s little chance of “user supplied data” ending up in those function calls.
Our Fortify scans alerted us to possible SQL injection attacks in sqldict.py, and upon inspection it does appear to have a number of SQL statements built with Python's string-building %s feature rather than sqlite's parameterized queries.
Is that something that can be fixed? It's giving our cyber team fits. =)
-Rob
The text was updated successfully, but these errors were encountered: