defmodule Sobelow.SQL do
@moduledoc """
# SQL Injection
SQL Injection occurs when untrusted input is interpolated
directly into a SQL query. In a typical Phoenix application,
this would mean using the `Ecto.Adapters.SQL.query` method
and not using the parameterization feature.
Read more about SQL injection here:
https://www.owasp.org/index.php/SQL_Injection
If you wish to learn more about the specific vulnerabilities
found within the SQL Injection category, you may run the
following commands to find out more:
$ mix sobelow -d SQL.Query
$ mix sobelow -d SQL.Stream
SQL Injection checks of all types can be ignored with the following command:
$ mix sobelow -i SQL
"""
@submodules [Sobelow.SQL.Query, Sobelow.SQL.Stream]
use Sobelow.FindingType
def get_vulns(fun, meta_file, _web_root, skip_mods \\ []) do
allowed = @submodules -- (Sobelow.get_ignored() ++ skip_mods)
Enum.each(allowed, fn mod ->
apply(mod, :run, [fun, meta_file])
end)
end
def details do
@moduledoc
end
end