-
Notifications
You must be signed in to change notification settings - Fork 10
Open
Description
There is a potential security vulnerability in the codebase related to SQL injection. Specifically, object keys (paths) are being used directly in SQL queries without proper escaping or parameterization. This could allow attackers to inject malicious SQL through crafted object keys.
Suggested Fix:
- Audit all places where object keys are used to construct SQL queries.
- Ensure that all object keys are properly escaped or, preferably, parameterized.
- Add tests to verify that SQL injection is not possible via object keys.
Action Items:
- Identify all instances in the codebase where object keys are interpolated into SQL queries.
- Refactor these queries to use parameterized statements or proper escaping mechanisms.
- Add or update tests to cover these cases and prevent regressions.
cc @aalexfvk
I created this issue for @NikitaUnisikhin from #352 (comment).
Tips and commands
Getting Help
- Contact our support team for questions or feedback.
- Visit our documentation for detailed guides and information.
- Keep in touch with the Sourcery team by following us on X/Twitter, LinkedIn or GitHub.
Metadata
Metadata
Assignees
Labels
No labels