mirror of
https://github.com/rails/rails.git
synced 2022-11-09 12:12:34 -05:00
Update active_record_querying.md
he or she => they
This commit is contained in:
parent
5827824a6f
commit
5b37036b0a
1 changed files with 1 additions and 1 deletions
|
@ -436,7 +436,7 @@ to this code:
|
|||
Client.where("orders_count = #{params[:orders]}")
|
||||
```
|
||||
|
||||
because of argument safety. Putting the variable directly into the conditions string will pass the variable to the database **as-is**. This means that it will be an unescaped variable directly from a user who may have malicious intent. If you do this, you put your entire database at risk because once a user finds out he or she can exploit your database they can do just about anything to it. Never ever put your arguments directly inside the conditions string.
|
||||
because of argument safety. Putting the variable directly into the conditions string will pass the variable to the database **as-is**. This means that it will be an unescaped variable directly from a user who may have malicious intent. If you do this, you put your entire database at risk because once a user finds out they can exploit your database they can do just about anything to it. Never ever put your arguments directly inside the conditions string.
|
||||
|
||||
TIP: For more information on the dangers of SQL injection, see the [Ruby on Rails Security Guide](security.html#sql-injection).
|
||||
|
||||
|
|
Loading…
Reference in a new issue