We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 1f5c362 commit 8ffabb0Copy full SHA for 8ffabb0
aikido_zen/vulnerabilities/sql_injection/init_test.py
@@ -264,6 +264,17 @@ def test_user_input_is_multiline():
264
is_not_sql_injection("SELECT * FROM users WHERE id = 'a\nb\nc';", "a\nb\nc")
265
266
267
+def test_user_input_contains_unsafe_unicode():
268
+ is_sql_injection(
269
+ "SELECT * FROM users WHERE id = 'a \udce9'\nOR 1=1#'",
270
+ "a \udce9'\nOR 1=1#",
271
+ "generic",
272
+ )
273
+ is_not_sql_injection(
274
+ "SELECT * FROM users WHERE id = 'a\udce9\nb\nc';", "a\udce9\nb\nc"
275
276
+
277
278
def test_user_input_is_longer_than_query():
279
is_not_sql_injection("SELECT * FROM users", "SELECT * FROM users WHERE id = 'a'")
280
0 commit comments