{keyword} Union All Select Null,null,null,null,null,null,null-- Pvwz May 2026
This is the #1 defense. It treats user input as literal data, not executable code.
: This attempts to combine the results of the original legitimate database query with a new query controlled by the attacker.
Ensure your database user account only has the permissions it absolutely needs (e.g., a web app shouldn't have permission to drop tables). This is the #1 defense
The string you provided is a common technique used in . Specifically:
: This is a comment operator in SQL. It tells the database to ignore the rest of the original query, preventing errors from trailing code. How to Prevent This Ensure your database user account only has the
Use "allow-lists" to ensure input matches the expected format (e.g., ensuring a ZIP code is only numbers).
If you're building an application, you should never let user input go directly into a database query. Instead, use these industry-standard defenses: It tells the database to ignore the rest
Example (Python/psycopg2): cursor.execute("SELECT * FROM users WHERE name = %s", (user_input,))