Great. Thank you.


On Mon, Feb 28, 2011 at 9:37 PM, Michael Bayer <mike...@zzzcomputing.com>wrote:

>
> On Feb 28, 2011, at 5:35 PM, Ryan wrote:
>
> > Can't find anything in the docs as to whether query strings passed into
> Session.execute are escaped/safe from SQL injection. Any insights? Thanks.
>
> A literal query string is only safe against injection if you ensure that
> the string contains no portions of user-entered text inside of it.    Bind
> parameters should always be used for literal values.   Docs on the text()
> construct which Session.execute() uses, and the accepted bind parameter
> format, are here:
> http://www.sqlalchemy.org/docs/core/expression_api.html#sqlalchemy.sql.expression.text
>
>
> >
> > --
> > You received this message because you are subscribed to the Google Groups
> "sqlalchemy" group.
> > To post to this group, send email to sqlalchemy@googlegroups.com.
> > To unsubscribe from this group, send email to
> sqlalchemy+unsubscr...@googlegroups.com.
> > For more options, visit this group at
> http://groups.google.com/group/sqlalchemy?hl=en.
>
> --
> You received this message because you are subscribed to the Google Groups
> "sqlalchemy" group.
> To post to this group, send email to sqlalchemy@googlegroups.com.
> To unsubscribe from this group, send email to
> sqlalchemy+unsubscr...@googlegroups.com.
> For more options, visit this group at
> http://groups.google.com/group/sqlalchemy?hl=en.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"sqlalchemy" group.
To post to this group, send email to sqlalchemy@googlegroups.com.
To unsubscribe from this group, send email to 
sqlalchemy+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sqlalchemy?hl=en.

Reply via email to