Skip to main content

simple python ast consumer which searches for common SQL injection attacks

Project description

py_find_injection

Walks the AST and looks for arguments to cursor.execute or session.execute; then determines whether string interpolation, concatenation or the .format() call is used on those arguments. Not at all comprehensive, but better than nothing.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

py-find-injection-0.1.1.tar.gz (2.9 kB view details)

Uploaded Source

File details

Details for the file py-find-injection-0.1.1.tar.gz.

File metadata

File hashes

Hashes for py-find-injection-0.1.1.tar.gz
Algorithm Hash digest
SHA256 9c1bbd87f2da3c00580a99032b82ab91289b2d94098cbaee7fe2501db67a5c0e
MD5 5976a38bdc8d041e4c7724224d2fffd4
BLAKE2b-256 6f4af491942bb8a5948509bd7256e804fb1dfa00bc3b64190e05eac6c06f66ae

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page