@@ -60,22 +60,22 @@ async fn test_sqlx_mysql(url: &str, enable_remote: bool) -> Result<(), sqlx::Err
6060 let _ = conn. execute ( safe_query_1. as_str ( ) ) . await ?; // $ sql-sink
6161 let _ = conn. execute ( safe_query_2. as_str ( ) ) . await ?; // $ sql-sink
6262 let _ = conn. execute ( safe_query_3. as_str ( ) ) . await ?; // $ sql-sink
63- let _ = conn. execute ( unsafe_query_1. as_str ( ) ) . await ?; // $ sql-sink MISSING: Alert[sql-injection]=args1
63+ let _ = conn. execute ( unsafe_query_1. as_str ( ) ) . await ?; // $ sql-sink MISSING: Alert[rust/ sql-injection]=args1
6464 if enable_remote {
65- let _ = conn. execute ( unsafe_query_2. as_str ( ) ) . await ?; // $ sql-sink Alert=remote1
66- let _ = conn. execute ( unsafe_query_3. as_str ( ) ) . await ?; // $ sql-sink Alert=remote1
67- let _ = conn. execute ( unsafe_query_4. as_str ( ) ) . await ?; // $ sql-sink MISSING: Alert[sql-injection]=remote1
65+ let _ = conn. execute ( unsafe_query_2. as_str ( ) ) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote1
66+ let _ = conn. execute ( unsafe_query_3. as_str ( ) ) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote1
67+ let _ = conn. execute ( unsafe_query_4. as_str ( ) ) . await ?; // $ sql-sink MISSING: Alert[rust/ sql-injection]=remote1
6868 }
6969
7070 // prepared queries
7171 let _ = sqlx:: query ( safe_query_1. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink
7272 let _ = sqlx:: query ( safe_query_2. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink
7373 let _ = sqlx:: query ( safe_query_3. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink
74- let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink MISSING: Alert[sql-injection]=args1
74+ let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink MISSING: Alert[rust/sql-injection][rust/ sql-injection]=args1
7575 if enable_remote {
76- let _ = sqlx:: query ( unsafe_query_2. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink Alert=remote1
77- let _ = sqlx:: query ( unsafe_query_3. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink Alert=remote1
78- let _ = sqlx:: query ( unsafe_query_4. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink MISSING: Alert[sql-injection]=remote1
76+ let _ = sqlx:: query ( unsafe_query_2. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote1
77+ let _ = sqlx:: query ( unsafe_query_3. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote1
78+ let _ = sqlx:: query ( unsafe_query_4. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink MISSING: Alert[rust/ sql-injection]=remote1
7979 }
8080 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( const_string) . execute ( & pool) . await ?; // $ sql-sink
8181 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( arg_string) . execute ( & pool) . await ?; // $ sql-sink
@@ -101,26 +101,26 @@ async fn test_sqlx_sqlite(url: &str, enable_remote: bool) -> Result<(), sqlx::Er
101101 // direct execution (with extra variants)
102102 let _ = conn. execute ( safe_query_1. as_str ( ) ) . await ?; // $ sql-sink
103103 if enable_remote {
104- let _ = conn. execute ( unsafe_query_1. as_str ( ) ) . await ?; // $ sql-sink Alert=remote2
104+ let _ = conn. execute ( unsafe_query_1. as_str ( ) ) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote2
105105 }
106106 // ...
107107 let _ = sqlx:: raw_sql ( safe_query_1. as_str ( ) ) . execute ( & mut conn) . await ?; // $ sql-sink
108108 if enable_remote {
109- let _ = sqlx:: raw_sql ( unsafe_query_1. as_str ( ) ) . execute ( & mut conn) . await ?; // $ sql-sink Alert=remote2
109+ let _ = sqlx:: raw_sql ( unsafe_query_1. as_str ( ) ) . execute ( & mut conn) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote2
110110 }
111111
112112 // prepared queries (with extra variants)
113113 let _ = sqlx:: query ( safe_query_1. as_str ( ) ) . execute ( & mut conn) . await ?; // $ sql-sink
114114 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & const_string) . execute ( & mut conn) . await ?; // $ sql-sink
115115 if enable_remote {
116- let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . execute ( & mut conn) . await ?; // $ sql-sink Alert=remote2
116+ let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . execute ( & mut conn) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote2
117117 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & remote_string) . execute ( & mut conn) . await ?; // $ sql-sink
118118 }
119119 // ...
120120 let _ = sqlx:: query ( safe_query_1. as_str ( ) ) . fetch ( & mut conn) ; // $ sql-sink
121121 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & const_string) . fetch ( & mut conn) ; // $ sql-sink
122122 if enable_remote {
123- let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . fetch ( & mut conn) ; // $ sql-sink Alert=remote2
123+ let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . fetch ( & mut conn) ; // $ sql-sink Alert[rust/sql-injection] =remote2
124124 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & remote_string) . fetch ( & mut conn) ; // $ sql-sink
125125 }
126126 // ...
@@ -129,7 +129,7 @@ async fn test_sqlx_sqlite(url: &str, enable_remote: bool) -> Result<(), sqlx::Er
129129 let row2: ( i64 , String , String ) = sqlx:: query_as ( prepared_query_1. as_str ( ) ) . bind ( & const_string) . fetch_one ( & mut conn) . await ?; // $ sql-sink
130130 println ! ( " row2 = {:?}" , row2) ;
131131 if enable_remote {
132- let _: ( i64 , String , String ) = sqlx:: query_as ( unsafe_query_1. as_str ( ) ) . fetch_one ( & mut conn) . await ?; // $ sql-sink Alert=remote2
132+ let _: ( i64 , String , String ) = sqlx:: query_as ( unsafe_query_1. as_str ( ) ) . fetch_one ( & mut conn) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote2
133133 let _: ( i64 , String , String ) = sqlx:: query_as ( prepared_query_1. as_str ( ) ) . bind ( & remote_string) . fetch_one ( & mut conn) . await ?; // $ sql-sink
134134 }
135135 // ...
@@ -138,15 +138,15 @@ async fn test_sqlx_sqlite(url: &str, enable_remote: bool) -> Result<(), sqlx::Er
138138 let row4: ( i64 , String , String ) = sqlx:: query_as ( prepared_query_1. as_str ( ) ) . bind ( & const_string) . fetch_optional ( & mut conn) . await ?. expect ( "no data" ) ; // $ sql-sink
139139 println ! ( " row4 = {:?}" , row4) ;
140140 if enable_remote {
141- let _: ( i64 , String , String ) = sqlx:: query_as ( unsafe_query_1. as_str ( ) ) . fetch_optional ( & mut conn) . await ?. expect ( "no data" ) ; // $ sql-sink $ Alert=remote2
141+ let _: ( i64 , String , String ) = sqlx:: query_as ( unsafe_query_1. as_str ( ) ) . fetch_optional ( & mut conn) . await ?. expect ( "no data" ) ; // $ sql-sink $ Alert[rust/sql-injection] =remote2
142142 let _: ( i64 , String , String ) = sqlx:: query_as ( prepared_query_1. as_str ( ) ) . bind ( & remote_string) . fetch_optional ( & mut conn) . await ?. expect ( "no data" ) ; // $ sql-sink
143143 }
144144 // ...
145145 let _ = sqlx:: query ( safe_query_1. as_str ( ) ) . fetch_all ( & mut conn) . await ?; // $ sql-sink
146146 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & const_string) . fetch_all ( & mut conn) . await ?; // $ sql-sink
147147 let _ = sqlx:: query ( "SELECT * FROM people WHERE firstname=?" ) . bind ( & const_string) . fetch_all ( & mut conn) . await ?; // $ sql-sink
148148 if enable_remote {
149- let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . fetch_all ( & mut conn) . await ?; // $ sql-sink Alert=remote2
149+ let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . fetch_all ( & mut conn) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote2
150150 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & remote_string) . fetch_all ( & mut conn) . await ?; // $ sql-sink
151151 let _ = sqlx:: query ( "SELECT * FROM people WHERE firstname=?" ) . bind ( & remote_string) . fetch_all ( & mut conn) . await ?; // $ sql-sink
152152 }
@@ -174,14 +174,14 @@ async fn test_sqlx_postgres(url: &str, enable_remote: bool) -> Result<(), sqlx::
174174 // direct execution
175175 let _ = conn. execute ( safe_query_1. as_str ( ) ) . await ?; // $ sql-sink
176176 if enable_remote {
177- let _ = conn. execute ( unsafe_query_1. as_str ( ) ) . await ?; // $ sql-sink Alert=remote3
177+ let _ = conn. execute ( unsafe_query_1. as_str ( ) ) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote3
178178 }
179179
180180 // prepared queries
181181 let _ = sqlx:: query ( safe_query_1. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink
182182 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & const_string) . execute ( & pool) . await ?; // $ sql-sink
183183 if enable_remote {
184- let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink Alert=remote3
184+ let _ = sqlx:: query ( unsafe_query_1. as_str ( ) ) . execute ( & pool) . await ?; // $ sql-sink Alert[rust/sql-injection] =remote3
185185 let _ = sqlx:: query ( prepared_query_1. as_str ( ) ) . bind ( & remote_string) . execute ( & pool) . await ?; // $ sql-sink
186186 }
187187
0 commit comments