| { | |
| "task_id": "security_hard_1", | |
| "task_name": "SQL Injection Vulnerability", | |
| "description": "Find the SQL injection vulnerability in the database query", | |
| "difficulty": "hard", | |
| "code_diff": "def get_user_data(user_id):\n query = f\"SELECT * FROM users WHERE id = {user_id}\"\n return database.execute(query)", | |
| "expected_issues": [ | |
| { | |
| "line": 2, | |
| "type": "sql_injection", | |
| "severity": "critical", | |
| "description": "SQL injection vulnerability from string interpolation" | |
| } | |
| ] | |
| } |