Auto-Fix SQL Injection
AI-powered remediation of SQL injection vulnerabilities in your codebase.
What Shipwright Fixes
- String concatenation in SQL queries
- Template literals with user input
- Dynamic query building
- Raw SQL in ORMs
- Stored procedure injection
Fix Strategies
Parameterized Queries
Shipwright converts string concatenation to parameterized queries:
// Before
db.query(`SELECT * FROM users WHERE id = ${id}`);
// After (Shipwright fix)
db.query('SELECT * FROM users WHERE id = $1', [id]);ORM Methods
When using an ORM, Shipwright uses type-safe query builders:
// Before
User.findAll({ where: `name = '${name}'` });
// After (Shipwright fix)
User.findAll({ where: { name } });