From 473c3a694e83f49bed8692745d1d333ee409f6b3 Mon Sep 17 00:00:00 2001 From: AulaEmpresaLKS <129507941+AulaEmpresaLKS@users.noreply.github.com> Date: Mon, 31 Mar 2025 11:55:48 +0200 Subject: [PATCH] Update Owner.java Signed-off-by: AulaEmpresaLKS <129507941+AulaEmpresaLKS@users.noreply.github.com> --- .../samples/petclinic/owner/Owner.java | 15 --------------- 1 file changed, 15 deletions(-) diff --git a/src/main/java/org/springframework/samples/petclinic/owner/Owner.java b/src/main/java/org/springframework/samples/petclinic/owner/Owner.java index 65d422a0e..a0e6d3c5b 100644 --- a/src/main/java/org/springframework/samples/petclinic/owner/Owner.java +++ b/src/main/java/org/springframework/samples/petclinic/owner/Owner.java @@ -138,19 +138,4 @@ public class Owner extends Person { .append("telephone", this.telephone) .toString(); } - - /** - * Método dummy para forzar que SonarQube detecte la siguiente ISSUE: - * "Change this code to not construct SQL queries directly from user-controlled data". - * - * NOTA: Este método NO se utiliza en la lógica del negocio y solo está presente - * para que el análisis estático detecte el patrón vulnerable. - * - * @param userInput entrada controlada por el usuario - * @return Consulta SQL construida de forma insegura - */ - public String buildVulnerableQuery(String userInput) { - String vulnerableQuery = "SELECT * FROM Users WHERE email = '" + userInput + "'"; - return vulnerableQuery; - } }