How to use the built in SQL injection protection
I'm looking at the built in SQL injection protection in the MSSQL module for Node:
https://www.npmjs.com/package/mssql#injection
But I don't totally get their example of how to sanitize values for my queries. I guess the request.input('myval', sql.VarChar, '-- commented')
statement sanitizes "myvar" against the rest of the query being commented out.
What if I want to sanitize against something else as well? Such as drop table statements etc.
Could anyone help me out?
链接地址: http://www.djcxy.com/p/16776.html上一篇: 获取Oracle中所有表的列表?
下一篇: 如何使用内置的SQL注入保护