ruff/docs/rules/hardcoded-sql-expression.md

498 B

hardcoded-sql-expression (S608)

Derived from the flake8-bandit linter.

What it does

Checks for strings that resemble SQL statements involved in some form string building operation.

Why is this bad?

SQL injection is a common attack vector for web applications. Unless care is taken to sanitize and control the input data when building such SQL statement strings, an injection attack becomes possible.

Example

query = "DELETE FROM foo WHERE id = '%s'" % identifier