Skip to content

Commit db77745

Browse files
committed
checker: modify checker description
Signed-off-by: Maharshi Basu <basumaharshi10@gmail.com>
1 parent 186c1c1 commit db77745

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

checkers/python/aws-lambda-sqli.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ import (
1010
var AwsLambdaSqlInjection *analysis.Analyzer = &analysis.Analyzer{
1111
Name: "aws-lambda-sqli",
1212
Language: analysis.LangPy,
13-
Description: "An SQL statement in the code is using data from the event object, which could lead to SQL injection if the input is user-controlled and not properly sanitized. To prevent this vulnerability, it's recommended to use parameterized queries or prepared statements. For example, instead of directly embedding variables in the query, use cursor.execute('SELECT * FROM projects WHERE status = %s', ('active',)) to ensure safe query execution.",
13+
Description: "An SQL statement in the code is using data from the event object, which could lead to SQL injection if the input is user-controlled and not properly sanitized. To prevent this vulnerability, it's recommended to use parameterized queries or prepared statements.",
1414
Category: analysis.CategorySecurity,
1515
Severity: analysis.SeverityWarning,
1616
Run: checkAwsLambdaSqlInjection,

0 commit comments

Comments
 (0)