Feature: Taint Analysis Want to check that taint analysis works properly Background: Given I have the following config """ """ @skip Scenario: input returns various types Given I have the following code """ input('foo', false); DB::raw($input); } """ When I run Psalm with taint analysis Then I see these errors | Type | Message | | TaintedInput | Detected tainted sql in path: Illuminate\Http\Request::input (/Users/brownma/Desktop/git/laravel-psalm-plugin/src/Stubs/InteractsWithInput.stubphp:22:21) -> $input (somefile.php:9:3) -> Illuminate\Support\Facades\DB::raw#1 (/Users/brownma/Desktop/git/laravel-psalm-plugin/src/Stubs/DBFacade.stubphp:15:25) |