Properly sanitize or escape all user-provided inputs before using them in sensitive contexts to prevent injection attacks. This applies to multiple contexts:
Properly sanitize or escape all user-provided inputs before using them in sensitive contexts to prevent injection attacks. This applies to multiple contexts:
-request = request.filter(`contains(subject, '${query}')`);
+const escapedQuery = query.replace(/'/g, "''");
+request = request.filter(`contains(subject, '${escapedQuery}')`);
-return `<div dir="ltr">${latestReplyHtml}</div>`;
+return DOMPurify.sanitize(`<div dir="ltr">${latestReplyHtml}</div>`);
-<rule_name>${rule.name}</rule_name>
+<rule_name>${escape(rule.name)}</rule_name>
-${user.about ? `<user_info>${user.about}</user_info>` : ""}
+${user.about ? `<user_info>${sanitizeText(user.about)}</user_info>` : ""}
Input sanitization is your first line of defense against injection vulnerabilities and should be applied consistently throughout your codebase.
Enter the URL of a public GitHub repository