https://github.com/thomasleplus/java-sql-inspector
Utility to test Java code for SQL injection vulnerabilities.
https://github.com/thomasleplus/java-sql-inspector
antlr antlr-4 antlr-grammar antlr4 antlr4-grammar antlr4-java information-security infosec java jdbc jdk security sql sql-injection-vulnerabilities
Last synced: about 2 months ago
JSON representation
Utility to test Java code for SQL injection vulnerabilities.
- Host: GitHub
- URL: https://github.com/thomasleplus/java-sql-inspector
- Owner: thomasleplus
- License: apache-2.0
- Created: 2016-11-26T01:14:49.000Z (over 8 years ago)
- Default Branch: main
- Last Pushed: 2025-04-02T05:35:27.000Z (2 months ago)
- Last Synced: 2025-04-02T06:29:30.762Z (2 months ago)
- Topics: antlr, antlr-4, antlr-grammar, antlr4, antlr4-grammar, antlr4-java, information-security, infosec, java, jdbc, jdk, security, sql, sql-injection-vulnerabilities
- Language: ANTLR
- Homepage:
- Size: 775 KB
- Stars: 10
- Watchers: 2
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Security: SECURITY.md
Awesome Lists containing this project
README
# Java SQL Inspector
Utility to test Java code for SQL injection vulnerabilities. It uses [Antlr](https://www.antlr.org) to parse SQL queries and detects any literal value in the statement that should be handled via a prepared statement bind variable instead (using '?' as a placeholder).
[](https://github.com/thomasleplus/java-sql-inspector/actions?query=workflow:"Maven")
[](https://github.com/thomasleplus/java-sql-inspector/actions?query=workflow:"CodeQL")