Skip to content

Is this package handling injection attack? #193

Discussion options

You must be logged in to vote

Because the Query url get's exposed
This is only true if you implement it that way. Some of the design decisions we made in developing the way data is sent to a filter and applied in that filter were:

  • The filter method shouldn't have knowledge of a request to avoid tightly coupling a user generated request into to filter logic
    • The example User::filter($request->all())->get(); can just as well be User::filter(['name' => $request->query('name')])->get();
  • Requiring explicit filter methods to be defined.
    • This avoids passing too much data to a filter and having it implicitly try to constrain by property names.

Is this package handling a query injection attack?
This package doesn't h…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by Tucker-Eric
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants