Comment by skrebbel
5 years ago
That translates to "don't use SQLite", right?
How would an application that uses SQLite as a file format be able to scan for malicious database files that trigger buffer overflows in the SQLite engine? I'm really not sure what you're suggesting.
RTFM
https://www.sqlite.org/security.html