It depends on how it is used. Looking at the examples on the linked page, we have:
syntax description
$table->where("field", "x") Translated to field = 'x'
$table->where("field > ?", "x") bound by PDO
As you can see, the first case simply puts the value used in the query, without any further processing. If you use a type value:
$table->where("field", "Robert'); DROP TABLE Students;--")
Then it will be placed in the query, and you will receive an SQL Injection. However, if you use the second form:
$table->where("field = ?", "Robert'); DROP TABLE Students;--")
Then the '
value will be "escaped", and your system will be safe.
In summary, using Fluentpdo will not automatically make your system secure or insecure, it is necessary to take each API call into consideration, case by case, when determining the security of the application.
Grateful for the response! :)
– Edgard Hufelande