I'd like to run some ad-hoc queries against my database without opening up a 
security vulnerability. I don't see any direct way to use parameterized queries 
from DBXTalk. I'd expect to see something like #executeStatement:withArguments: 
but I don't. In fact, I don't even see odbx_escape in the image anywhere. 
What's the trick here? Surely GlorpDBX et. al. are not gluing together bits of 
SQL with bits of user-supplied text and running it unescaped. What am I missing?

http://www.linuxnetworks.de/doc/index.php/OpenDBX/C_API/Usage#Executing_statements

Thanks for your time,

— 
Daniel Lyons




Reply via email to