simple python ast consumer which searches for common SQL injection attacks
Project description
py_find_injection
Walks the AST and looks for arguments to cursor.execute or session.execute; then determines whether string interpolation, concatenation or the .format() call is used on those arguments. Not at all comprehensive, but better than nothing.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.