Is there an injection safe way to call via the axpata business connector
string salesId = someObject.Text;
IAxaptaRecord salesLine = ax.CreateRecord("SalesLine");
salesLine.ExecuteStmt("select * from %1 where %1.SalesId == '" + salesId + "'");
If someObject.Text is set to the following, i am then vulnerable to x++ code injection:
"SomeSalesOrder' || %1.SalesId == 'SomeOtherOrder"
Is there a way to parametrize the query, or would it be better to write all of the data access code directly in x++, and then call that from COM?