You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Replace string concatenation with format() function in role management
scripts to prevent SQL injection with special characters in usernames
or passwords.
Use %I for identifier quoting and %L for literal escaping. While these
scripts are intended for DBA use in interactive sessions, using format()
is better practice and handles edge cases with special characters.
Files modified:
- roles/alter_user_with_random_password.psql
- roles/create_user_with_random_password.psql
Co-Authored-By: Claude <[email protected]>
0 commit comments