{ "task_id": "security_hard_1", "task_name": "SQL Injection Vulnerability", "description": "Find the SQL injection vulnerability in the database query", "difficulty": "hard", "code_diff": "def get_user_data(user_id):\n query = f\"SELECT * FROM users WHERE id = {user_id}\"\n return database.execute(query)", "expected_issues": [ { "line": 2, "type": "sql_injection", "severity": "critical", "description": "SQL injection vulnerability from string interpolation" } ] }