Ruby String Interpolation with Event Data
Lambda event fields are directly interpolated into SQL strings using Ruby's #{} syntax.
SQL injection vulnerability where event-supplied user input is interpolated or concatenated into SQL queries without using parameters or proper binding, potentially allowing attackers to read, alter, or delete database data and perform unauthorized administrative actions, compromising integrity and confidentiality.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Lambda event fields are directly interpolated into SQL strings using Ruby's #{} syntax.
Sourcery automatically identifies sql injection from event data concatenated into sql string in aws lambda and many other security issues in your codebase.