Skip to content

[Security] possible SQL injection via string formatting in execute() #2692

@tejasae-afk

Description

@tejasae-afk

File: agents/extensions/memory/advanced_sqlite_session.py (line 349)

Building SQL queries with f-strings or % formatting lets user-controlled input alter the query structure. Use parameterized queries instead: cursor.execute("SELECT ... WHERE id = %s", (user_id,))

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions