SQL validation limitations
-
Hello,
I’m using Automator for WordPress and I’m running into a limitation related to the built-in SQL validation.
When using actions that execute custom SQL, any query containing standard keywords like INSERT, UPDATE or DELETE is blocked with the message “Dangerous SQL keywords detected”. I fully understand the security rationale behind this, however in my case the SQL is fully controlled (no user input involved) and is used only for internal logging/synchronization within my own plugin / WordPress environment.
I’d like to ask:
Is there any official or supported way to relax or bypass this validation for trusted/internal use cases?
Are there filters, hooks, or recommended patterns (other than rewriting everything to PHP + $wpdb) intended for advanced users?
If not, is there a roadmap consideration for allowing developers to explicitly opt in to trusted SQL execution?
At the moment, the only viable workaround seems to be executing all logic through custom PHP actions, which works but limits flexibility when designing Automator recipes.
I’d really appreciate clarification on the intended approach for advanced / developer-level integrations.
Thank you for your time and for the great plugin.
Best regards,
Dawid
You must be logged in to reply to this topic.