You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The get_user function in the current code is susceptible to SQL injection attacks due to the direct inclusion of the id value from the data dictionary into the SQL query string. Additionally, there is no proper error handling for potential exceptions that may occur during the database query.
🚀 We really appreciate your contribution. Before we proceed, please make sure to read our Contributing Guidelines to understand the project's requirements and best practices.
🕵️♂️ Once you've reviewed the guidelines, please wait until one of our team members reviews the issue and provides further feedback.
🙏 Thanks again for your help, and we look forward to your valuable contributions! Happy coding! 😄
Description
The get_user function in the current code is susceptible to SQL injection attacks due to the direct inclusion of the id value from the data dictionary into the SQL query string. Additionally, there is no proper error handling for potential exceptions that may occur during the database query.
Screenshots
No response
Checklist
The text was updated successfully, but these errors were encountered: