What do you think of when you see the following C# code:
ExecuteSql($"SELECT * FROM SomeTable WHERE SomeColumn = {someValue}");
- Huh? Nothing exciting here.
- STOP!!!! SQL injection vulnerability.
- Way cool language technique!!!! (Hint! Hint!)
What do you think of when you see the following C# code:
ExecuteSql($"SELECT * FROM SomeTable WHERE SomeColumn = {someValue}");