Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,3 +4,4 @@ cdsav
kjhbvljhv
wfewqfd
acWDSCV
wffqwe
20 changes: 13 additions & 7 deletions sam.py
Original file line number Diff line number Diff line change
@@ -1,19 +1,24 @@
import os
import sqlite3
import pickle

def process_user_request(user_input, username, raw_data):
"""
This function is intentionally vulnerable.
It contains multiple security issues for testing purposes.
"""

import sqlite3
import os
import pickle

# 1️⃣ SQL Injection
# Use parameterized queries to avoid SQL injection attacks.
conn = sqlite3.connect("users.db")
cursor = conn.cursor()
query = f"SELECT * FROM users WHERE username = '{username}'"
cursor.execute(query)
user_data = cursor.fetchall()
try:
# PRECOGS_FIX: use parameterized query to prevent SQL injection
cursor.execute("SELECT * FROM users WHERE username = ?", (username,))
user_data = cursor.fetchall()
finally:
cursor.close()
conn.close()

# 2️⃣ Command Injection
command = "echo Processing user && " + user_input
Expand Down Expand Up @@ -48,3 +53,4 @@ def process_user_request(user_input, username, raw_data):
"file_data": file_data,
"api_key_used": api_key
}