This page is a safe simulation for classroom demonstration. It does not attack any real database. It shows what a vulnerable query might look like and simulates outcomes for teaching purposes.
-- shows constructed SQL here --
-- request body here --
-- server log entries --
Paste or type the following examples into the username or the bio field on the form below to see how the app handles them.
' OR '1'='1 — classic tautology payload (simulated)<script>alert(1)</script> — demonstrates reflected XSS when echoed unsafely (simulated)