This rule aims to prevent SOQL injection vulnerabilities in Apex code. SOQL injection occurs when untrusted user input is concatenated directly into dynamic SOQL queries, potentially allowing attackers to manipulate the query and access or modify unauthorized data. This can lead to serious security risks including data leakage or corruption.
To avoid SOQL injection, always sanitize user inputs before incorporating them into dynamic SOQL queries. The recommended approach is to use the String.escapeSingleQuotes() method on any string variables that are concatenated into query strings. This method escapes special characters that could alter the intended query structure.
Non-Compliant Code Examples
public class ApexClass {
public void method(String foo) {
Database.query('SELECT Id FROM Account' + foo);
}
}
public class ApexClass {
public void method(String foo) {
String bar = foo;
Database.query('SELECT Id FROM Account' + bar);
}
}
public class ApexClass {
public void method(Integer i1, String s1, Integer s2) {
Database.query('SELECT Id FROM Account' + s1);
}
}
public class ApexClass {
public static List<Person> findPerson(String table, String name) {
List<Person> results = Database.query(
'SELECT Id, Name ' +
'FROM ' + objectName + ' ' +
'WHERE Name LIKE \'%' + String.escapeSingleQuotes(searchKey)
);
return results;
}
}
Compliant Code Examples
public class ApexClass {
public void method(String bar) {
String foo = String.escapeSingleQuotes(bar);
Database.query('SELECT Id FROM Account' + foo);
}
}
public class ApexClass {
public void method(String foo) {
String bar = foo;
String baz = String.escapeSingleQuotes(bar);
Database.query('SELECT Id FROM Account' + baz);
}
}
public class ApexClass {
public void method(Integer arg1, String arg2, Integer arg3) {
String foobar = String.escapeSingleQuotes(arg2);
Database.query('SELECT Id FROM Account' + foobar);
}
}
public class ApexClass {
public void method(Integer arg1, String arg2, Integer arg3) {
String str = arg2;
String foobar = String.escapeSingleQuotes(str);
Database.query('SELECT Id FROM Account' + foobar);
}
}
원활한 통합. Datadog Code Security를 경험해 보세요
Datadog Code Security
이 규칙을 사용해 Datadog Code Security로 코드를 분석하세요
규칙 사용 방법
1
2
rulesets:- apex-security # Rules to enforce Apex security.
리포지토리 루트에 위의 내용을 포함하는 static-analysis.datadog.yml을 만듭니다
무료 IDE 플러그인을 사용하거나 CI 파이프라인에 Code Security 검사를 추가합니다