SQL Injection Prevention
# Python - Using Parameterized Queries
import mysql.connector
def safe_query(user_input):
conn = mysql.connector.connect(
host="localhost",
user="user",
password="password",
database="mydb"
)
cursor = conn.cursor(prepared=True)
# Safe: Using parameterized query
sql = "SELECT * FROM users WHERE username = %s"
cursor.execute(sql, (user_input,))
return cursor.fetchall()
XSS Prevention
// JavaScript - Input Sanitization
function sanitizeHTML(str) {
return str.replace(/[&<>"']/g, function(match) {
const escape = {
'&': '&',
'<': '<',
'>': '>',
'"': '"',
"'": '''
};
return escape[match];
});
}
// Example usage
const userInput = "";
const safeOutput = sanitizeHTML(userInput);