Client for detecting harmful SQL queries using a third-party API
Project description
# Hacking Shield
**Hacking Shield** is a Python client for detecting harmful SQL queries using a third-party API. It helps developers ensure the security of their applications by identifying potentially malicious SQL statements before they can be executed.
## Table of Contents
- [Features](#features)
- [Installation](#installation)
- [Usage](#usage)
- [API Reference](#api-reference)
- [Contributing](#contributing)
- [License](#license)
## Features
- Detect harmful SQL queries using a third-party API.
- Simple and easy-to-use client interface.
- Supports authorization with API keys for secure access.
- Easy installation with pip.
## Installation
You can install the package using pip:
```bash
pip install hacking_shield
Usage
Here's a quick example of how to use the Hacking Shield client:
from hacking_shield import SQLDetectionClient
# Initialize the client with your API key
client = SQLDetectionClient(api_key="your_api_key")
# Define a SQL query
sql_query = "SELECT * FROM users WHERE id = 1 OR 1=1;"
# Detect harmful SQL
result = client.detect_harmful_sql(sql_query)
if result:
print("Detection Result:", result)
Replace "your_api_key"
with your actual API key.
API Reference
SQLDetectionClient
-
__init__(api_key: str)
: Initializes the client with the provided API key. -
detect_harmful_sql(sql_query: str) -> dict
: Sends the SQL query to the API for detection. Returns a dictionary with the result.
Contributing
Contributions are welcome! If you have suggestions for improvements or find bugs, please open an issue or submit a pull request.
Steps to Contribute
- Fork the repository.
- Create your feature branch (
git checkout -b feature/new-feature
). - Commit your changes (
git commit -m 'Add new feature'
). - Push to the branch (
git push origin feature/new-feature
). - Open a pull request.
License
This project is licensed under the MIT License. See the LICENSE file for details.
### Customization Suggestions:
- **Add More Features**: If there are additional features or functionalities, feel free to expand the "Features" section.
- **Include Example Outputs**: If you have specific expected outputs from the API, you can include those in the "Usage" section.
- **Contributors Section**: If there are collaborators, consider adding a "Contributors" section to give them credit.
### Notes:
- Ensure the formatting is correct when you copy it into your `README.md` file, especially for code blocks.
- You can add images, badges, or links to related projects as needed to enhance the README.
If you have specific details you’d like to include or any other adjustments, let me know!
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file hacking_shield-0.2.1.tar.gz
.
File metadata
- Download URL: hacking_shield-0.2.1.tar.gz
- Upload date:
- Size: 4.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.11.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | ab3fd6a3db2e987d9f9bc58a823f0ec6da50174585e5ebd803f305fdbd987e6d |
|
MD5 | 265c6ff9664eefbcf24104b10b354ab5 |
|
BLAKE2b-256 | c3c864b512d26060e364338bf6f11500c07e0eb6b629c6a60594a84e953dd28a |
File details
Details for the file hacking_shield-0.2.1-py3-none-any.whl
.
File metadata
- Download URL: hacking_shield-0.2.1-py3-none-any.whl
- Upload date:
- Size: 4.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.11.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3f80a94e6d855129d0876ec748310cc3fc448d05b64c24e48e3bdf94ccf616a2 |
|
MD5 | e1834004c56cf170394ecae0aaa92801 |
|
BLAKE2b-256 | b96d1b2e14d7013dd066425512448b41b60d76b7c09311696dc57afc1f50272f |