Open teeann opened 5 years ago
In order to fix this bug, an additional module needs to be added to the code which checks the string on the left from the add operator to contain a keyword (SELECT) followed by a random string (an attribute name) and the string to the right to contain a keyword (FROM).
And also, the query ("SELECT a " + "FROM " + vuln) needs to be added in the example scripts to be more informative to the users of Bandit.
Describe the bug
injection_sql.py
plugin fails to checkhardcoded_sql_expressions
on certain test cases.To Reproduce Steps to reproduce the behavior:
test.py
file with content:bandit test.py
Expected behavior The above
test.py
file should generatehardcoded_sql_expressions
issue.Bandit version