SQL injection security check

POST https://postman-echo.com/post

This test checks if it is possible to inject malicious strings as a request parameter. If your server is not handling user input properly, these strings can be interpreted by your server as SQL commands that result in leaking sensitive information or general mayhem.

Request Body

[{"name"=>"customerName", "value"=>"' or '1'='1", "datatype"=>"string"}, {"name"=>"anotherAttack", "value"=>"' or 1=1; drop table myTable; --", "datatype"=>"string"}]

RESPONSES

status: OK

{"args":{},"data":"","files":{},"form":{"customerName":"' or '1'='1"},"headers":{"x-forwarded-proto":"https","host":"postman-echo.com","content-length":"38","accept":"*/*","accept-encoding":"gzip, deflate","cache-control":"no-cache","content-type":"application/x-www-form-urlencoded","cookie":"sails.sid=s%3A7tFj5KB_lujWMK1xoroPV_xSKkRDxR1W.qUauhME8lGY%2FnBlCT4iVRCs0badee7%2Fmen9XorL%2FJ4s","postman-token":"031152dc-59c7-4529-8f8a-29faf9f41afe","user-agent":"PostmanRuntime/7.3.0","x-forwarded-port":"443"},"json":{"customerName":"' or '1'='1"},"url":"https://postman-echo.com/post"}