String Concatenation in go-pg Clauses
Non-literal variables are concatenated into SQL fragments used in go-pg Where, WhereOr, Join, and other clauses.
SQL injection vulnerability where non-literal variables are concatenated or formatted into SQL strings instead of parameter binding in go-pg ORM operations, potentially allowing attackers to read, modify, or delete database data and escalate privileges.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Non-literal variables are concatenated into SQL fragments used in go-pg Where, WhereOr, Join, and other clauses.
Sourcery automatically identifies sql injection from concatenated sql fragments in go-pg orm clauses and many other security issues in your codebase.