在使用“database/sql"时如何防止 Go 中的 SQL 注入攻击?
问题描述:
构建我的第一个 web 应用程序并希望更好地理解 SQL 注入 (https://github.com/astaxie/build-web-application-with-golang/blob/master/en/eBook/09.4.md).
Building my first web-app and want to understand SQL injection better (https://github.com/astaxie/build-web-application-with-golang/blob/master/en/eBook/09.4.md).
仅仅总是使用database/sql"库并使用?"构造查询,我可以获得多少针对 SQL 注入的保护?而不是连接字符串?在这种情况下,我还需要担心什么样的 SQL 注入攻击?
How much protection against SQL injection do I get from just always using the 'database/sql' library and constructing queries using '?' instead of concatting strings? What kind of SQL injection attacks will I still have to worry about in that case?