SQL injection security check

POST https://postman-echo.com/post

Hackers can attack your web server by injecting malicious strings as a request parameter. If your server is not handling user input properly, these strings can be interpreted by your server as SQL commands that result in leaking sensitive information or general mayhem.

More resources here.

Request Body

[{"name"=>"customerName", "value"=>"' or '1'='1", "datatype"=>"string"}, {"name"=>"anotherAttack", "value"=>"' or 1=1; drop table myTable; --", "datatype"=>"string"}]

RESPONSES

status: OK

{"args":{},"data":"","files":{},"form":{"customerName":"' or '1'='1"},"headers":{"x-forwarded-proto":"https","host":"postman-echo.com","content-length":"38","accept":"*/*","accept-encoding":"gzip, deflate","cache-control":"no-cache","content-type":"application/x-www-form-urlencoded","cookie":"sails.sid=s%3A7tFj5KB_lujWMK1xoroPV_xSKkRDxR1W.qUauhME8lGY%2FnBlCT4iVRCs0badee7%2Fmen9XorL%2FJ4s","postman-token":"031152dc-59c7-4529-8f8a-29faf9f41afe","user-agent":"PostmanRuntime/7.3.0","x-forwarded-port":"443"},"json":{"customerName":"' or '1'='1"},"url":"https://postman-echo.com/post"}