By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
ToolAccuracy of FindingsDetects Non-Pattern-Based Issues?Coverage of SAST FindingsSpeed of ScanningUsability & Dev Experience
DryRun SecurityVery high – caught multiple critical issues missed by othersYes – context-based analysis, logic flaws & SSRFBroad coverage of standard vulns, logic flaws, and extendableNear real-time PR feedback
Snyk CodeHigh on well-known patterns (SQLi, XSS), but misses other categoriesLimited – AI-based, focuses on recognized vulnerabilitiesGood coverage of standard vulns; may miss SSRF or advanced auth logic issuesFast, often near PR speedDecent GitHub integration, but rules are a black box
GitHub Advanced Security (CodeQL)Very high precision for known queries, low false positivesPartial – strong dataflow for known issues, needs custom queriesGood for SQLi and XSS but logic flaws require advanced CodeQL experience.Moderate to slow (GitHub Action based)Requires CodeQL expertise for custom logic
SemgrepMedium, but there is a good community for adding rulesPrimarily pattern-based with limited dataflowDecent coverage with the right rules, can still miss advanced logic or SSRFFast scansHas custom rules, but dev teams must maintain them
SonarQubeLow – misses serious issues in our testingLimited – mostly pattern-based, code quality orientedBasic coverage for standard vulns, many hotspots require manual reviewModerate, usually in CIDashboard-based approach, can pass “quality gate” despite real vulns
Vulnerability ClassSnyk (partial)GitHub (CodeQL) (partial)SemgrepSonarQubeDryRun Security
SQL Injection
*
Cross-Site Scripting (XSS)
SSRF
Auth Flaw / IDOR
User Enumeration
Hardcoded Token
ToolAccuracy of FindingsDetects Non-Pattern-Based Issues?Coverage of C# VulnerabilitiesScan SpeedDeveloper Experience
DryRun Security
Very high – caught all critical flaws missed by others
Yes – context-based analysis finds logic errors, auth flaws, etc.
Broad coverage of OWASP Top 10 vulns plus business logic issuesNear real-time (PR comment within seconds)Clear single PR comment with detailed insights; no config or custom scripts needed
Snyk CodeHigh on known patterns (SQLi, XSS), but misses logic/flow bugsLimited – focuses on recognizable vulnerability patterns
Good for standard vulns; may miss SSRF or auth logic issues 
Fast (integrates into PR checks)Decent GitHub integration, but rules are a black box (no easy customization)
GitHub Advanced Security (CodeQL)Low - missed everything except SQL InjectionMostly pattern-basedLow – only discovered SQL InjectionSlowest of all but finished in 1 minuteConcise annotation with a suggested fix and optional auto-remedation
SemgrepMedium – finds common issues with community rules, some missesPrimarily pattern-based, limited data flow analysis
Decent coverage with the right rules; misses advanced logic flaws 
Very fast (runs as lightweight CI)Custom rules possible, but require maintenance and security expertise
SonarQube
Low – missed serious issues in our testing
Mostly pattern-based (code quality focus)Basic coverage for known vulns; many issues flagged as “hotspots” require manual review Moderate (runs in CI/CD pipeline)Results in dashboard; risk of false sense of security if quality gate passes despite vulnerabilities
Vulnerability ClassSnyk CodeGitHub Advanced Security (CodeQL)SemgrepSonarQubeDryRun Security
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
Server-Side Request Forgery (SSRF)
Auth Logic/IDOR
User Enumeration
Hardcoded Credentials
VulnerabilityDryRun SecuritySemgrepGitHub CodeQLSonarQubeSnyk Code
1. Remote Code Execution via Unsafe Deserialization
2. Code Injection via eval() Usage
3. SQL Injection in a Raw Database Query
4. Weak Encryption (AES ECB Mode)
5. Broken Access Control / Logic Flaw in Authentication
Total Found5/53/51/51/50/5
Product Updates
April 15, 2024

Say Goodbye to SQLi in Go and Python

Who knew that after all these years, we’d still be talking about SQL injection?  I mean, if you had asked me 20 years ago if we’d still even have SQL, I might have said, nah, surely we’ll SELECT something else by then… (I only feel a little sorry for the SQL pun).

But, here we are. 

SQL injection (SQLi) is still alive and well and still important in application security. Despite the advancements in web frameworks and programming languages, SQLi vulnerabilities continue to surface, posing significant risks to the integrity and security of applications. In light of this, DryRun Security has taken a proactive step by integrating SQLi analysis into our AppSec Analyzer, one of several analyzers that give you super-fast security code reviews on GitHub PRs. 

[n.b. If you aren’t familiar with our approach of appsec using AI for detection and defense, then I’d love to show you the future of static application security testing with our Contextual SAST tool. It’ll change the way you think about application security. Get you a demo and see what’s possible.] 

Understanding SQLi in Modern Frameworks

Python Django and Golang Object-Relational Mapping (GORM) are modern frameworks designed with security in mind. However, even in these environments, developers can inadvertently introduce SQLi vulnerabilities through unsafe queries. 

Let’s look at a simple example of each. 

SQLi Golang GORM

SQLi vulnerabilities can occur in Golang applications using the GORM library, especially when dynamic SQL queries are constructed improperly. GORM is a popular ORM that aims to simplify database operations. However, just like any tool that interacts with databases, if not used correctly, it can open the door to SQLi attacks. These vulnerabilities primarily arise when inputs are concatenated directly into queries without proper sanitization or parameterization, allowing attackers to inject malicious SQL into the database.

For example, consider the following Golang GORM code snippet:

go
package main
import (
"gorm.io/driver/sqlite"
"gorm.io/gorm"
)‍

type Product struct {
gorm.Model
   Code  string
   Price uint
}

func main() {
db, err := gorm.Open(sqlite.Open("test.db"), &gorm.Config{})
   if err != nil {
   panic("failed to connect database")
}

var product Product
   userInput := "'; DROP TABLE products; --"
   db.Where("code = '" + userInput + "'").First(&product)
}

In this example, the `Where` clause includes a variable `userInput` that is concatenated directly into the SQL query. If `userInput` contains malicious SQL commands, such as `'; DROP TABLE products; --`, it can lead to destructive SQL injection attacks, such as dropping tables or altering database content. This vulnerability stems from the lack of proper input handling and the direct use of user input in constructing the SQL query.

SQLi in Python Django

SQL injection (SQLi) vulnerabilities can also be a concern in applications built using Python Django, particularly when developers bypass Django's ORM by using raw SQL queries or improperly handling user inputs. Django's ORM is designed to help prevent SQL injection by using querysets, which are inherently safe from SQLi because they use parameterized queries. However, when developers opt to use raw SQL queries for complex database operations, they must be vigilant to ensure inputs are sanitized.

Consider this Python Django example where SQLi can occur:

python

from django.db import connection

from django.http import HttpResponse

def unsafe_raw_sql(request):

    user_id = request.GET.get('user_id')

    # Unsafe SQL query

    with connection.cursor() as cursor:

        cursor.execute("SELECT * FROM users WHERE id = '%s'" % user_id)

        row = cursor.fetchone()

    return HttpResponse(row)

In the above code, the `user_id` is directly interpolated into the SQL query string. If `user_id` is manipulated to include SQL commands, it could lead to SQL injection. For example, if `user_id` is input as `0' OR '1'='1`, it could modify the query logic to return all users, exposing sensitive data. The vulnerability arises because the code directly uses string interpolation (`%s`) to include user input in the SQL command without any validation or escaping, highlighting the importance of avoiding such patterns in Django applications.

How the DryRun Security AppSec Analyzer handles SQLi

The secret to getting accurate results so quickly is the way we use AI by incorporating LLMs into the code review. We’ve created a code review and inquiry methodology that mimics a professional code reviewer. Through that process, which really deserves a separate blog post (coming soon!), we determine the context around the change and then assess the risk. By using a mix of advanced AI techniques in tandem with our knowledge base and proprietary code review methodology we are able to deliver highly accurate results at lightning speed. 

The Role of Contextual Security Analysis

At DryRun Security, we leverage Contextual Security Analysis (CSA) to enhance the detection and management of SQLi (and more) vulnerabilities. CSA uses the SLIDE model (Surface, Language, Intent, Detection, Environment) to evaluate the risk associated with code changes, providing a more nuanced and effective approach to security analysis.

Take Charge of SQLi Vulnerabilities

SQL injection remains a persistent threat, but with the right tools and approaches, it can be effectively detected. By integrating SQLi analysis into our AppSec Analyzer and leveraging Contextual Security Analysis, DryRun Security is providing developers with a powerful resource to enhance the security of their applications. I encourage you to try out the DryRun Security GitHub app (which includes our updated AppSec Analyzer) and stay tuned for future enhancements that will further streamline and strengthen your security practices.


DryRun Security is a Contextual SAST tool that will change the way you think about application security! Schedule a demo with us and see what’s possible.


At DryRun Security we think Contextual Security Analysis is the future of AppSec. If you're interested in learning more about CSA and how it can benefit your application security efforts, download our free Contextual Security Analysis Guide.