Bug #3164 | prepared statement query validation ant task | ||
---|---|---|---|
Submitted: | 13 Mar 2004 1:01 | Modified: | 11 Nov 2009 2:35 |
Reporter: | Ralf Hauser | Email Updates: | |
Status: | Won't fix | Impact on me: | |
Category: | Connector / J | Severity: | S4 (Feature request) |
Version: | any | OS: | Any (any) |
Assigned to: | Mark Matthews | CPU Architecture: | Any |
[13 Mar 2004 1:01]
Ralf Hauser
[10 May 2004 17:39]
Ralf Hauser
maybe also eclipse's Java Editor GUI could do this? (See https://bugs.eclipse.org/bugs/show_bug.cgi?id=61614)
[2 Oct 2005 19:51]
Ralf Hauser
Another feature of this validator task could be to ensure the "sql" string of PreparedStatement java.sql.Connection.prepareStatement(String sql) is used in a way resistant to injection attacks - i.e. no "..." + variable + "..." concatenations, but all variables bound via "?" see also: http://www.integrigy.com/info/IntegrigyRethinkingSQLInjectionAttacks.pdf