all of the workflows of n8n i could find (also from the site itself)
fix: use parameterized queries to prevent SQL injection
Replace string concatenation in SQL query construction with parameterized queries using placeholders. This prevents potential SQL injection attacks where user-supplied keywords could manipulate the query structure. Changes: - Convert keyword search to use ? placeholders with params list - Parameterize trigger_type filtering conditions - Parameterize LIMIT clause - Pass params array to cursor.execute()
C
Cole Murray committed
a5552238fe1e6f9e193eed6ca8527d0a008ee85f
Parent: 0261fe5