> What about hacking somehow the sqlite library to disallow chained
queries
> (or at least do it optionally)?

If you are unable or unwilling to verify the safety of your input,
use a database that supports params + binding (like Firebird :-))

Any input obtained from the client should be considered unsafe
(== tainted in Perl) and should be checked for correctness first.
In the described case, casting the value to a number if it's
expected to be numerical or putting quotes around it if it's expected
to be a string value will solve your problem. Disallowing chained
queries will prevent *every* developer from ever using it.

Ard



-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to