A vulnerability analysis tool is provided for identifying SQL injection
threats. The tool is able to take advantage of the fact that the code for
many database applications is located in modules stored within a
database. The tool constructs a data flow graph based on all, or a
specified subset, of the application code within the database. The tool
identifies, within the data flow graph, the nodes that represent values
used to construct SQL commands. Paths to those nodes are analyzed to
determine whether any SQL injection threats exist.