We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent b7887ae commit 6a5b7cbCopy full SHA for 6a5b7cb
mug-safesql/src/main/java/com/google/mu/safesql/README.md
@@ -29,7 +29,7 @@ when `sql.query()` is called.
29
### 1. SQL Injection
30
31
While JDBC `PreparedStatement` is a vital defense against SQL Injection (SQLi),
32
-relying on it alone is a critical flaw, especially with **dynamic SQL construction**.
+relying on it alone is often insufficient, due to **dynamic SQL construction**.
33
When query components like table names or `ORDER BY` clauses are built from user input using raw string concatenation
34
(or `JdbcTemplate`, or MyBatis `${}` interpolation, jooq's escape hatch etc.) a wide-open door for injection is created.
35
0 commit comments