Python
Using the Python DB API, don't do this:
# Do NOT do it this way.
cmd = "update people set name='%s' where id='%s'" % (name, id)
curs.execute(cmd)
This builds a SQL string using Python's string formatting, but it creates an unsafe string that is then passed through to the database and executed.
Instead, do this:
cmd = "update people set name=%s where id=%s"
curs.execute(cmd, (name, id))
This sets up placeholders so that the database can fill in the data values properly and safely.
For cases involving a single variable do this:
cmd = "SELECT * FROM PEOPLE WHERE name = %s"
curs.execute(cmd, (name,))
Note that the placeholder syntax depends on the database you are using.
'qmark' Question mark style,
e.g. '...WHERE name=?'
'numeric' Numeric, positional style,
e.g. '...WHERE name=:1'
'named' Named style,
e.g. '...WHERE name=:name'
'format' ANSI C printf format codes,
e.g. '...WHERE name=%s'
'pyformat' Python extended format codes,
e.g. '...WHERE name=%(name)s'
The values for the most common databases are:
>>> import MySQLdb; print MySQLdb.paramstyle # MySQL
format
>>> import oursql; print oursql.paramstyle # MySQL also
qmark
>>> import psycopg2; print psycopg2.paramstyle # PostgreSQL
pyformat
>>> import pymssql; pymssql.paramstyle # MS SQL Server
pyformat
>>> import sqlite3; print sqlite3.paramstyle
qmark
So if you are using MySQL or PostgreSQL, use %s
(even for numbers and
other non-string values!) and if you are using SQLite use ?
.
If you are using ODBC to connect to the DB, regardless of which DB it is,
use ?
.