What this is
summary by Triage Agent
The findByCustomer method in OrderRepository.java:87 builds its SQL by concatenating the user-supplied customerId directly into the query string. An attacker who controls that parameter can inject arbitrary SQL — including UNION SELECT attacks to read other customers' orders, or destructive statements like DROP TABLE.
Show technical detail →
AI
Triage Agent matched
CWE-89 · selected spring-sql-injection@2.3 playbook · confidence 98% · 4m 12s agoClosure blockers
3 of 4 cleared
Code change applied
2h ago
Tests pass
1h ago
Fortify rescan clean
42m ago
Awaiting human approval
8m
Acceptance criteria
from playbook
Query uses parameter binding (PreparedStatement / @Param), no string concatenation
Regression test with malicious input passes
Fortify rescan shows finding closed
Reviewer Agent approval
Human security lead approval (required for critical severity)
MR merged to main and deployed