You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Here's a file that demonstrates the issue when checked with ruff check --select S608 test.py:
user_input="SELECT * FROM bad_stuff"bad_detected=f""" SELECT *, foo FROM ({user_input}) raw"""bad_undetected=f""" SELECT *, foo FROM ({user_input}) raw"""
I'd expect both bad_detected and bad_undetected to be warned about, but this only warns with test.py:2:16: S608 Possible SQL injection vector through string-based query construction.
This used to work correctly in ruff 0.4, but broke at some point between then and ruff 0.9.2.
The text was updated successfully, but these errors were encountered:
Here's a file that demonstrates the issue when checked with
ruff check --select S608 test.py
:I'd expect both
bad_detected
andbad_undetected
to be warned about, but this only warns withtest.py:2:16: S608 Possible SQL injection vector through string-based query construction
.This used to work correctly in ruff 0.4, but broke at some point between then and ruff 0.9.2.
The text was updated successfully, but these errors were encountered: