fmt.Sprintf in SQL Construction
Using fmt.Sprintf or string concatenation to build SQL queries with variables in go-pg operations.
SQL injection vulnerability where the SQL is built with string concatenation or fmt.Sprintf, inserting variables directly instead of using placeholders and bound parameters, potentially allowing attackers to read or modify data, run arbitrary SQL, and compromise database integrity through injected SQL syntax.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Using fmt.Sprintf or string concatenation to build SQL queries with variables in go-pg operations.
Sourcery automatically identifies sql injection from non-literal variables in go-pg sql query and many other security issues in your codebase.