Shardul Dhekane
CRE Main Update
a21d9ae
raw
history blame contribute delete
565 Bytes
{
"task_id": "security_hard_1",
"task_name": "SQL Injection Vulnerability",
"description": "Find the SQL injection vulnerability in the database query",
"difficulty": "hard",
"code_diff": "def get_user_data(user_id):\n query = f\"SELECT * FROM users WHERE id = {user_id}\"\n return database.execute(query)",
"expected_issues": [
{
"line": 2,
"type": "sql_injection",
"severity": "critical",
"description": "SQL injection vulnerability from string interpolation"
}
]
}