Does oci_bind_by_name prevent SQL injection safely?
问题 I have read the documentation provided by oracle here, where it states that: Binding is important for Oracle database performance and also as a way to avoid SQL Injection security issues. How safe is it to use oci_bind_by_name to escape variables? Are there better practices to avoid SQL Injection, or does oci_bind_by_name suffice? TIA! 回答1: Using bound parameters is sufficient in common cases, and good practice for avoiding SQL injection. But a parameter in a prepared statement can be used