How to Check Text for SQL Injection Attacks in Python

pip install cloudmersive-validate-api-client
from __future__ import print_function
import time
import cloudmersive_validate_api_client
from import ApiException
from pprint import pprint
# Configure API key authorization: Apikey
configuration = cloudmersive_validate_api_client.Configuration()
configuration.api_key['Apikey'] = 'YOUR_API_KEY'
# create an instance of the API class
api_instance = cloudmersive_validate_api_client.TextInputApi(cloudmersive_validate_api_client.ApiClient(configuration))
value = 'value_example' # str | User-facing text input.
detection_level = 'detection_level_example' # str | Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended). (optional)
# Check text input for SQL Injection (SQLI) attacks
api_response = api_instance.text_input_check_sql_injection(value, detection_level=detection_level)
except ApiException as e:
print("Exception when calling TextInputApi->text_input_check_sql_injection: %s\n" % e)



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


There’s an API for that. Cloudmersive is a leader in Highly Scalable Cloud APIs.