@@ -23,7 +23,7 @@ module ClassMethods
23
23
# Note that this sanitization method is not schema-aware, hence won't do any type casting
24
24
# and will directly use the database adapter's +quote+ method.
25
25
# For MySQL specifically this means that numeric parameters will be quoted as strings
26
- # to prevent query manimupation attacks.
26
+ # to prevent query manipulation attacks.
27
27
#
28
28
# sanitize_sql_for_conditions(["role = ?", 0])
29
29
# # => "role = '0'"
@@ -55,7 +55,7 @@ def sanitize_sql_for_conditions(condition)
55
55
# Note that this sanitization method is not schema-aware, hence won't do any type casting
56
56
# and will directly use the database adapter's +quote+ method.
57
57
# For MySQL specifically this means that numeric parameters will be quoted as strings
58
- # to prevent query manimupation attacks.
58
+ # to prevent query manipulation attacks.
59
59
#
60
60
# sanitize_sql_for_assignment(["role = ?", 0])
61
61
# # => "role = '0'"
@@ -145,7 +145,7 @@ def sanitize_sql_like(string, escape_character = "\\")
145
145
# Note that this sanitization method is not schema-aware, hence won't do any type casting
146
146
# and will directly use the database adapter's +quote+ method.
147
147
# For MySQL specifically this means that numeric parameters will be quoted as strings
148
- # to prevent query manimupation attacks.
148
+ # to prevent query manipulation attacks.
149
149
#
150
150
# sanitize_sql_array(["role = ?", 0])
151
151
# # => "role = '0'"
0 commit comments