Skip to main content

simple python ast consumer which searches for common SQL injection attacks

Project description

py_find_injection

Walks the AST and looks for arguments to cursor.execute or session.execute; then determines whether string interpolation, concatenation or the .format() call is used on those arguments. Not at all comprehensive, but better than nothing.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page