You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@superset.apache.org by GitBox <gi...@apache.org> on 2022/01/21 17:57:07 UTC

[GitHub] [superset] d9k edited a comment on issue #17719: SQL injection with Jinja 2 templates: how to escape values?

d9k edited a comment on issue #17719:
URL: https://github.com/apache/superset/issues/17719#issuecomment-995812196


   @andrey-mikhailov don't have what? 
   
   > mysql-real-escape-string function
   
   Superset uses python, not php


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscribe@superset.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org



---------------------------------------------------------------------
To unsubscribe, e-mail: notifications-unsubscribe@superset.apache.org
For additional commands, e-mail: notifications-help@superset.apache.org