integration/getqueryinfo/test.php:14 SecurityCheck-SQLInjection Calling method \Wikimedia\Rdbms\IReadableDatabase::select() in \MySpecialPage::getQueryInfo that outputs using tainted argument #2. (Caused by: Builtin-\Wikimedia\Rdbms\IReadableDatabase::select) (Caused by: integration/getqueryinfo/test.php +12) integration/getqueryinfo/test.php:14 SecurityCheck-SQLInjection Calling method \Wikimedia\Rdbms\IReadableDatabase::select() in \MySpecialPage::getQueryInfo that outputs using tainted argument #3 (`[$_GET['somethingEvil']]`). (Caused by: Builtin-\Wikimedia\Rdbms\IReadableDatabase::select) integration/getqueryinfo/test.php:22 SecurityCheck-SQLInjection HAVING clause is user controlled (Originally at: integration/getqueryinfo/test.php:14) integration/getqueryinfo/test.php:24 SecurityCheck-SQLInjection GROUP BY clause is user controlled (Originally at: integration/getqueryinfo/test.php:14) integration/getqueryinfo/test.php:32 SecurityCheck-SQLInjection The ON conditions are not properly escaped for the join to `page` (Originally at: integration/getqueryinfo/test.php:14) integration/getqueryinfo/test2.php:37 SecurityCheck-SQLInjection Calling method \Wikimedia\Rdbms\IReadableDatabase::select() in \UnsafeGetQueryInfo::getQueryInfo that outputs using tainted argument #3 (`[$_GET['somethingEvil']]`). (Caused by: Builtin-\Wikimedia\Rdbms\IReadableDatabase::select) integration/getqueryinfo/test2.php:51 SecurityCheck-SQLInjection Calling method \Wikimedia\Rdbms\MysqlDatabase::select() in \UnsafeGetQueryInfo::doQuery that outputs using tainted argument #3 (`$qi['conds']`). (Caused by: Builtin-\Wikimedia\Rdbms\Database::select) (Caused by: integration/getqueryinfo/test2.php +49; integration/getqueryinfo/test2.php +37)