First, an LLM is assigned to identify the relevant tables required to handle the user’s request. It returns a list of table names to the next node, which executes a SELECT statement to fetch the first ...
In this sample lets validate a real sql injection - use a popular DB framework - make this VERY lightweight nothing fancy - just needs to highlight calling an execute query without parameterization ...