Comment by xigoi

1 year ago

The very first example on that page is vulnerable to injection.

Which one?

  •   #!/bin/bash 
      function csv_to_parquet() {     
          file_path="$1"     
          duckdb -c "COPY (SELECT * FROM read_csv_auto('$file_path')) TO '${file_path%.*}.parquet' (FORMAT PARQUET);" }

    • Eh, in the context of the site and other snippets that seems pedantic.

      Could it be run on untrusted user input? Sure. Does it actually pose a threat? It's improbable.