How does Dapper help protect against SQL injections? I am testing out different DAL technologies and have to choose one to be secure our site. I'm leaning towards Dapper (http://code.google.com/p/dapper-dot-net/), but need some help learning about security.
相关问题
- Generic Generics in Managed C++
- How to Debug/Register a Permanent WMI Event Which
- 'System.Threading.ThreadAbortException' in
- Bulk update SQL Server C#
- Should I use static function in c# where many call
You just need to use parameterized queries like you always should. Since Dapper is just a "tiny" (and pretty thin) extension to "raw" SQL and ADO.NET - just use parameterized ADO.NET queries and supply parameters.
See this sample from the Dapper-Dot-Net site:
The SQL query uses parameters - and you supply those to the "Dapper" query.
To summarize: using Dapper in itself doesn't help protect against SQL injections per se - using parameterized ADO.NET/SQL queries however does (and those queries are absolutely supported by Dapper, no issues at all)
It makes it really, really easy to do fully parameterized data access, without ever needing to either concatenate input. In particular, because you don't need to jump through lots of "add parameter, set the parameter type, check for null because ADO.NET has sucky null-handling, rinse/repeat for 20 parameters", by making parameter handling stupidly convenient. It also makes turning rows into objects really easy, avoiding the temptation to use
DataTable
... everyone wins.From comments:
To answer, let's take the example from marc_s's reply, and write it the old way, assuming all we have to start with is
connection
. This is then:except I've over-simplfied grossly, as it also deals with a wide range of issues such as:
AddWithValue
rarely exists)dynamic
(for multi-column) or primitives etc (for single column) when the output doesn't warrant generation a POCO / DTODataTable