Android app already developed using ActiveAndroid
public static List<ModelNames> search(String pattern) {
return new Select().from(ModelNames.class)
.where("title LIKE '%" + pattern + "%' or content LIKE '%" + pattern + "%'")
.orderBy("title")
.execute();
}
Now it is prone to SQL injection.
Has anyone encountered a similar problem and found a solution, or could someone provide a solution for the same?
Found a github problem but couldn't find the right solution.
source
share