String Concatenation in Raw Queries
Event fields are directly concatenated into SQL strings passed to sequelize.query() without replacements.
SQL injection vulnerability where untrusted event fields are concatenated into SQL passed to sequelize.query without parameterization or proper binding, potentially allowing attackers to read or modify database data, escalate privileges, or run arbitrary queries via crafted Lambda event input.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Event fields are directly concatenated into SQL strings passed to sequelize.query() without replacements.
Sourcery automatically identifies sql injection from aws lambda event data in sequelize raw query and many other security issues in your codebase.