douzhan1031 2011-10-14 19:36
浏览 23
已采纳

Kohana SQL准备声明安全

On the Kohana prepared statement documentation it states

Although all parameters are escaped to prevent SQL injection, it is still a good idea to validate/sanitize your input.

From what I read on prepared statements, I was under the impression that binding parameters prevented SQL injection. If this is not the case, what sanitization/escaping method should I be using before binding the variables?

  • 写回答

2条回答 默认 最新

  • duande9301 2011-10-14 19:40
    关注

    I think when they say "it is still a good idea to validate/sanitize", they mean to use Valid class or/and Validation class... To make sure you get the right data inserted in your DB.

    More info on Validation in Kohana: http://kohanaframework.org/3.2/guide/kohana/security/validation

    UPDATE:

    You should also look into XSS: http://kohanaframework.org/3.2/guide/kohana/security/xss

    本回答被题主选为最佳回答 , 对您是否有帮助呢?
    评论
查看更多回答(1条)

报告相同问题?

悬赏问题

  • ¥15 微信会员卡接入微信支付商户号收款
  • ¥15 如何获取烟草零售终端数据
  • ¥15 数学建模招标中位数问题
  • ¥15 phython路径名过长报错 不知道什么问题
  • ¥15 深度学习中模型转换该怎么实现
  • ¥15 HLs设计手写数字识别程序编译通不过
  • ¥15 Stata外部命令安装问题求帮助!
  • ¥15 从键盘随机输入A-H中的一串字符串,用七段数码管方法进行绘制。提交代码及运行截图。
  • ¥15 TYPCE母转母,插入认方向
  • ¥15 如何用python向钉钉机器人发送可以放大的图片?