Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

my 2 cents: 1) At the first place, yes, it does look like these are sureshot SQL injections. 2) However, we are looking through just a tiny window. There could be filter chains executed long before this code that would sanitize the request parameters before they are consumed anywhere else in the codebase.


It is a small window, however, wouldn't it be better to filter the values into an easily identifiable 'clean' variable? The code is still using $_GET, and while it may have been filtered above me, I have no indication of that - versus - $foo->cleaned('var') - where I can reasonably assume it is clean.


True, I couldnt agree more




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: