You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
All strings (or other types) are escaped before being sent to the database, so there is no risk of sql injection. Documentation should probably cover this.
I expected that it would take a list of params and simply pass them onto the database so the database can avoid 'executing' the params like it does the sql query.
We're using serverpod with a pretty intricate database schema, so we use custom queries a lot in order to make efficient queries rather than hitting the database constantly.
I wasn't able to find, in the docs, anything about sql injection or if it's guarded against or handled by serverpod.
The text was updated successfully, but these errors were encountered: