zlacker

[parent] [thread] 4 comments
1. abelch+(OP)[view] [source] 2024-08-24 20:07:25
duckDB is what sql should be in 2024

https://duckdbsnippets.com/

replies(1): >>xigoi+lf1
2. xigoi+lf1[view] [source] 2024-08-25 09:31:40
>>abelch+(OP)
The very first example on that page is vulnerable to injection.
replies(1): >>richbe+4U1
◧◩
3. richbe+4U1[view] [source] [discussion] 2024-08-25 16:11:39
>>xigoi+lf1
Which one?
replies(1): >>xigoi+eW1
◧◩◪
4. xigoi+eW1[view] [source] [discussion] 2024-08-25 16:24:17
>>richbe+4U1

  #!/bin/bash 
  function csv_to_parquet() {     
      file_path="$1"     
      duckdb -c "COPY (SELECT * FROM read_csv_auto('$file_path')) TO '${file_path%.*}.parquet' (FORMAT PARQUET);" }
replies(1): >>richbe+pb3
◧◩◪◨
5. richbe+pb3[view] [source] [discussion] 2024-08-26 01:59:46
>>xigoi+eW1
Eh, in the context of the site and other snippets that seems pedantic.

Could it be run on untrusted user input? Sure. Does it actually pose a threat? It's improbable.

[go to top]