{"id":27171147,"url":"https://github.com/sandhya80/preventing_sql_injectionattacks","last_synced_at":"2025-04-09T08:30:09.740Z","repository":{"id":226133920,"uuid":"767851866","full_name":"Sandhya80/Preventing_SQL_InjectionAttacks","owner":"Sandhya80","description":"Hardening the web-form to validate that the submission is a number, as well as converting the SQL query to a prepared statement preventing a SQL injection attack.","archived":false,"fork":false,"pushed_at":"2024-03-06T02:23:39.000Z","size":2,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-03-06T03:29:22.718Z","etag":null,"topics":["named-placeholders","prepared-statements","sanitizing-validating-forms-data","sql-injection-attacks","sql-injection-attacks-mitigation"],"latest_commit_sha":null,"homepage":"","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Sandhya80.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2024-03-06T02:21:50.000Z","updated_at":"2024-03-06T03:29:24.043Z","dependencies_parsed_at":"2024-03-06T03:29:23.987Z","dependency_job_id":"9fc7a5fb-991e-41b6-b06b-7a84fe334525","html_url":"https://github.com/Sandhya80/Preventing_SQL_InjectionAttacks","commit_stats":null,"previous_names":["sandhya80/preventing_sql_injectionattacks"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Sandhya80%2FPreventing_SQL_InjectionAttacks","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Sandhya80%2FPreventing_SQL_InjectionAttacks/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Sandhya80%2FPreventing_SQL_InjectionAttacks/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Sandhya80%2FPreventing_SQL_InjectionAttacks/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Sandhya80","download_url":"https://codeload.github.com/Sandhya80/Preventing_SQL_InjectionAttacks/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248002834,"owners_count":21031677,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["named-placeholders","prepared-statements","sanitizing-validating-forms-data","sql-injection-attacks","sql-injection-attacks-mitigation"],"created_at":"2025-04-09T08:30:08.984Z","updated_at":"2025-04-09T08:30:09.692Z","avatar_url":"https://github.com/Sandhya80.png","language":"JavaScript","funding_links":[],"categories":[],"sub_categories":[],"readme":"# Preventing_SQL_InjectionAttacks\n Hardening the web-form to validate that the submission is a number, as well as converting the SQL query to a prepared statement preventing a possible SQL injection attack.\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsandhya80%2Fpreventing_sql_injectionattacks","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsandhya80%2Fpreventing_sql_injectionattacks","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsandhya80%2Fpreventing_sql_injectionattacks/lists"}