Latest version: v0.0.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Use YAML files to strip SQL statements from the program, and implement dynamic SQL through Jinja2.
No known vulnerabilities found
Has known vulnerabilities