Is this package handling injection attack? #193
-
Because the Query url get's exposed, Is this package handling a query injection attack? if so, more details will be helpful for the package consumers. Thank you. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
But, as with every other library, this package isn't immune to a developer bypassing any of the framework features to sanitize input and explicitly introduce sql injection into their own queries. |
Beta Was this translation helpful? Give feedback.
filter
method shouldn't have knowledge of a request to avoid tightly coupling a user generated request into to filter logicUser::filter($request->all())->get();
can just as well beUser::filter(['name' => $request->query('name')])->get();