diff options
author | Guillermo Iguaran <guilleiguaran@gmail.com> | 2013-12-02 00:36:29 -0500 |
---|---|---|
committer | Guillermo Iguaran <guilleiguaran@gmail.com> | 2013-12-02 00:36:29 -0500 |
commit | 5b37036b0aa15ef26c65623457d1a2c8408e32d1 (patch) | |
tree | 5135101941a24ae2343d4302d977e82b8d9d477c | |
parent | 5827824a6fdc210165cec15f1aa65879493d0d7a (diff) | |
download | rails-5b37036b0aa15ef26c65623457d1a2c8408e32d1.tar.gz rails-5b37036b0aa15ef26c65623457d1a2c8408e32d1.tar.bz2 rails-5b37036b0aa15ef26c65623457d1a2c8408e32d1.zip |
Update active_record_querying.md
he or she => they
-rw-r--r-- | guides/source/active_record_querying.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/active_record_querying.md b/guides/source/active_record_querying.md index 94b8453f04..4725e2c8a2 100644 --- a/guides/source/active_record_querying.md +++ b/guides/source/active_record_querying.md @@ -436,7 +436,7 @@ to this code: Client.where("orders_count = #{params[:orders]}") ``` -because of argument safety. Putting the variable directly into the conditions string will pass the variable to the database **as-is**. This means that it will be an unescaped variable directly from a user who may have malicious intent. If you do this, you put your entire database at risk because once a user finds out he or she can exploit your database they can do just about anything to it. Never ever put your arguments directly inside the conditions string. +because of argument safety. Putting the variable directly into the conditions string will pass the variable to the database **as-is**. This means that it will be an unescaped variable directly from a user who may have malicious intent. If you do this, you put your entire database at risk because once a user finds out they can exploit your database they can do just about anything to it. Never ever put your arguments directly inside the conditions string. TIP: For more information on the dangers of SQL injection, see the [Ruby on Rails Security Guide](security.html#sql-injection). |