Clever vim plugin: given a series of string literals containing an interpolated variables, prompt the user for values and send the query to a real DB! https://www.vim.org/scripts/script.php?script_id=356
(convenient, but I hope it doesn't promote code vulnerable to SQL injection)
miniblog.
Related Posts
I've been reading about the object-capability model as seen in the E programming language.
It reminds me of dependency injection, but used pervasively. Rather than calling static methods, you pass in object arguments and call methods in them.
One underrated advantage of ORMs: it's significantly harder to write code vulnerable to SQL injection.
Several security vulnerability types are due to misusing strings: command injection, SQL injection, cross-site scripting.
How far could you go with a language that didn't have strings? You might need a Prose type that's a list of Unicode chars, but only use it for printing.