Check for variable declarations in a SQL statement where there is potential for SQL injections.
Non-Compliant Code Examples
vartable='baz';constfoo="SELECT foo FROM "+table;constselect=`SELECT foo FROM ${table}`;vardel=`DELETE FROM ${table} WHERE condition;`;letupdate=' UPDATE '+table+"SET column1 = value1, column2 = value2"+"WHERE condition;";
Compliant Code Examples
// Safe: using parameterized queries
constquery="SELECT foo FROM users WHERE id = ?";connection.query(query,[userId]);
シームレスな統合。 Datadog Code Security をお試しください
Datadog Code Security
このルールを試し、Datadog Code Security でコードを解析する
このルールの使用方法
1
2
rulesets:- javascript-node-security # Rules to enforce JavaScript node security.