Raw SQL with String Formatting
Using SQLAlchemy's execute() with raw SQL strings built from Lambda event data.
SQL injection vulnerability where event-derived values are concatenated or formatted into SQL strings passed to SQLAlchemy's execute() without parameter binding, allowing untrusted input to alter queries and potentially read, modify, or delete database data.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Using SQLAlchemy's execute() with raw SQL strings built from Lambda event data.
Sourcery automatically identifies sql injection from aws lambda event data in sql string with sqlalchemy and many other security issues in your codebase.