SQL Injection Prevention Mechanism

Q: What mechanisms does digiRunner use to prevent SQL Injection attacks?

(Keywords: SQL Injection, Security Checks, WAF, Gateway Protection, Risky Characters)

A: digiRunner implements basic SQL injection checks directly at the gateway level to ensure API security.

How it works:

The system uses a lightweight safeguard designed to block requests containing specific risky characters known to be associated with common injection attacks. Specifically, the gateway inspects traffic and blocks inputs containing:

  • Single quotes (')

  • Semicolons (;)

Important Security Note:

These checks serve as a first line of defense against obvious attack attempts. However, digiRunner does not include a built-in, full-featured Web Application Firewall (WAF).

For comprehensive protection against advanced or complex SQL injection threats, we strongly recommend a layered defense strategy: combine digiRunner with a dedicated WAF or infrastructure-level security controls.

Last updated

Was this helpful?