Socket
Socket
Sign inDemoInstall

eslint-plugin-sql-template

Package Overview
Dependencies
1
Maintainers
1
Versions
1
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

    eslint-plugin-sql-template

ESLint plugin with rules for using the `sql` template tag on raw SQL queries


Version published
Maintainers
1
Install size
67.0 kB
Created

Changelog

Source

2.0.0 (2016-10-03)

Merged pull requests:

  • Remove lodash dependency #4 (kurayama)
  • Use mocha --recursive flag #3 (kurayama)
  • Update README #2 (kurayama)
  • Create project with no-unsafe-query rule #1 (rplopes)

Readme

Source

eslint-plugin-sql-template

ESLint plugin with rules for using the sql template tag from a library such as sql-tag on raw SQL queries.

That library escapes data provided to an SQL query statement via interpolation. This prevents, for instance, potential SQL injection attacks.

This ESLint plugin helps teams enforce the usage of that tag, to avoid overlooked vulnerabilities from creeping into their codebases.

Installation

$ npm install eslint eslint-plugin-sql-template --save-dev

Usage

Create an .eslint.yml file with the following:

plugins:
  - sql-template

Then, you can add the custom rules to the .eslint.yml file:

rules:
  - sql-template/no-unsafe-query: 2

To lint your project with ESLint, add the following script to your package.json:

{
  "scripts": {
    "lint": "eslint ."
  }
}

and run the linter with:

$ npm run lint

Rules

This plugin includes the following list of rules.

no-unsafe-query

Disallows the usage of raw SQL templates with interpolation when not protected with the sql tag. Use this rule when you want to enforce protection against SQL injection attacks on all queries.

Example

Examples of incorrect code for this rule:

/*eslint sql-template/no-unsafe-query: "error"*/

const value = 42;
const query = `SELECT * FROM users WHERE id = ${value}`;
db.query(query);

const columns = 'id, name';
Users.query(`SELECT ${columns} FROM users`);

Examples of correct code for this rule:

/*eslint sql-template/no-unsafe-query: "error"*/

const value = 42;
const query = sql`SELECT * FROM users WHERE id = ${value}`;
db.query(query);

Users.query(`SELECT id, name FROM users`);

const punctuation = '!';
foo.bar(`Not SQL${punctuation}`);

Keywords

FAQs

Last updated on 03 Oct 2016

Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc