Avoid propagation of stealth procedures that you did not know were present
In this attack mode, a booby-trapped procedure slips into the primary database.
The hidden backdoor spreads to the migrated site.
Application APIs expose no DDL, so the procedure can’t propagate.
Last updated 7 months ago