Logo
addspay API Documentation

SQL injection security check

POST https://postman-echo.com/post

This test checks if it is possible to inject malicious strings as a request parameter. If your server is not handling user input properly, these strings can be interpreted by your server as SQL commands that result in leaking sensitive information or general mayhem.

 

Body PARAM

Key Datatype Required Description 



HEADERS

Key Datatype Required Description 




RESPONSES

status OK

{ "args": {}, "data": "", "files": {}, "form": { "customerName": "' or '1'='1" }, "headers": { "x-forwarded-proto": "https", "host": "postman-echo.com", "content-length": "38", "accept": "*/*", "accept-encoding": "gzip, deflate", "cache-control": "no-cache", "content-type": "application/x-www-form-urlencoded", "cookie": "sails.sid=s%3A7tFj5KB_lujWMK1xoroPV_xSKkRDxR1W.qUauhME8lGY%2FnBlCT4iVRCs0badee7%2Fmen9XorL%2FJ4s", "postman-token": "031152dc-59c7-4529-8f8a-29faf9f41afe", "user-agent": "PostmanRuntime/7.3.0", "x-forwarded-port": "443" }, "json": { "customerName": "' or '1'='1" }, "url": "https://postman-echo.com/post" }



Curl
curl -X POST 'https://postman-echo.com/post'

ENDPOINTS