-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
document (lack of?) risk of SQL injection #229
Comments
Yes.
I'm not sure we should go too in depth here. Protection from SQL injection attacks is pretty much an assumed feature of any ORM.
None |
Going to close this issue. Please do comment if you still think that there is something actionable to be done here. |
Well given the quote I do think that some documentation (one sentence) somewhere saying that SQL injection is stopped via escaping identifiers at runtime would be useful. |
Again, I think that escaping identifiers and strings (or using prepared statements, which is what we do) would be assumed of all ORMs, but feel free to open a PR and we can discuss the specific changes you'd like to make to the docs. |
Does diesel automatically escape variables to prevent SQL injection attacks?
I see
escape_identifier
for the postgresRawConnection
and indeed I was apparently unable to hijack my diesel-based interactions with Postgres. That said, I'm not a seasoned attacker, nor did I try with sqlite.I also found a quote claiming that SQL injection attacks are stopped.
Either way, it would be helpful to discuss what measures are taken by diesel and what measures should be taken by the user to prevent SQL injection attacks.
The text was updated successfully, but these errors were encountered: