Coding LiQL API calls so they don't look like SQL injection vulnerabilities
Does anyone have any recommendations on how to handle our LiQL calls so they don't look like SQL injection vulnerabilities to our automated security scan tools? We are concerned that we develop c...