--- a/relpipe-data/examples-guile-parametrized-queries.xml Tue Aug 04 00:59:32 2020 +0200
+++ b/relpipe-data/examples-guile-parametrized-queries.xml Tue Sep 08 14:21:19 2020 +0200
@@ -40,8 +40,7 @@
But it is fundamentally wrong. The input parameter is blindly pasted in middle of the Guile code.
So if we call e.g. <code>fstab-where-type 'ext4"'</code>, it crashes terribly.
Do you remember SQL injections in your first PHP scripts when you were 14?
- Do you remember <a href="https://xkcd.com/327/">XKCD: Exploits of a Mom</a>?
- Don't do it again!
+ Do not do it again!
</p>
<p>