npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

sql-escaper

v1.3.2

Published

🛡️ Faster SQL escape and format for JavaScript (Node.js, Bun, and Deno).

Readme

SQL Escaper

NPM Version NPM Downloads Coverage GitHub Workflow Status (Node.js) GitHub Workflow Status (Bun) GitHub Workflow Status (Deno)

Motivation

SQL Escaper is a rework of sqlstring (created by Douglas Wilson), by using an AST-based approach to parse and format SQL queries while maintaining its same API.

Rework includes:

  • TypeScript by default.
  • Support for Uint8Array and BigInt.
  • Support for both CJS and ESM exports.
  • Up to ~40% faster compared to sqlstring.
  • Distinguishes when a keyword is used as value.
  • Distinguishes when a column has a keyword name.
  • Distinguishes between multiple clauses/keywords in the same query.
  • Reasonable conservative support for Node.js v12 (sqlstring supports Node.js v0.6).

[!TIP]

SQL Escaper has the same API as the original sqlstring, so it can be used as a drop-in replacement. If SQL Escaper breaks any API usage compared to sqlstring, please, report it as a bug. Pull Requests are welcome.

[!IMPORTANT]

🔐 SQL Escaper is intended to fix a potential SQL Injection vulnerability reported in 2022. By combining the original sqlstring with mysqljs/mysql or MySQL2, objects passed as values could be expanded into SQL fragments, potentially allowing attackers to manipulate query structure. See sidorares/node-mysql2#4051 for details.

Regardless of the stringifyObjects value, objects used outside of SET or ON DUPLICATE KEY UPDATE contexts are always stringified as '[object Object]'. This is a security measure to prevent SQL Injection and is not interpreted as a breaking change for sqlstring usage.


Install

# Node.js
npm i sql-escaper
# Bun
bun add sql-escaper
# Deno
deno add npm:sql-escaper

MySQL2

For MySQL2, it already uses SQL Escaper as its default escaping library since version 3.17.0, so you just need to update it to the latest version:

npm i mysql2@latest

mysqljs/mysql

You can use an overrides in your package.json:

"dependencies": {
  "mysql": "^2.18.1"
},
"overrides": {
  "sqlstring": "npm:sql-escaper"
}
  • Next, clean the node_modules and reinstall the dependencies (npm i).
  • Please, note the minimum supported version of Node.js is 12.

Usage

For up-to-date documentation, always follow the README.md in the GitHub repository.

Quickstart

import { escape, escapeId, format, raw } from 'sql-escaper';

escape("Hello 'World'");
// => "'Hello \\'World\\''"

escapeId('table.column');
// => '`table`.`column`'

format('SELECT * FROM ?? WHERE id = ?', ['users', 42]);
// => 'SELECT * FROM `users` WHERE id = 42'

format('INSERT INTO users SET ?', [{ name: 'foo', email: '[email protected]' }]);
// => "INSERT INTO users SET `name` = 'foo', `email` = '[email protected]'"

escape(raw('NOW()'));
// => 'NOW()'

Import

ES Modules

import { escape, escapeId, format, raw } from 'sql-escaper';

CommonJS

const { escape, escapeId, format, raw } = require('sql-escaper');

API

escape

Escapes a value for safe use in SQL queries.

escape(value: SqlValue, stringifyObjects?: boolean, timezone?: Timezone): string
escape(undefined); // 'NULL'
escape(null); // 'NULL'
escape(true); // 'true'
escape(false); // 'false'
escape(5); // '5'
escape("Hello 'World"); // "'Hello \\'World'"

Dates

Dates are converted to YYYY-MM-DD HH:mm:ss.sss format:

escape(new Date(2012, 4, 7, 11, 42, 3, 2));
// => "'2012-05-07 11:42:03.002'"

Invalid dates return NULL:

escape(new Date(NaN)); // 'NULL'

You can specify a timezone:

const date = new Date(Date.UTC(2012, 4, 7, 11, 42, 3, 2));

escape(date, false, 'Z'); // "'2012-05-07 11:42:03.002'"
escape(date, false, '+01'); // "'2012-05-07 12:42:03.002'"
escape(date, false, '-05:00'); // "'2012-05-07 06:42:03.002'"

Buffers

Buffers are converted to hex strings:

escape(Buffer.from([0, 1, 254, 255]));
// => "X'0001feff'"

Objects

Objects with a toSqlString method will have that method called:

escape({ toSqlString: () => 'NOW()' });
// => 'NOW()'

Plain objects are converted to key = value pairs:

escape({ a: 'b', c: 'd' });
// => "`a` = 'b', `c` = 'd'"

Function properties in objects are ignored:

escape({ a: 'b', c: () => {} });
// => "`a` = 'b'"

When stringifyObjects is set to a non-nullish value, objects are stringified instead of being expanded into key-value pairs:

escape({ a: 'b' }, true);
// => "'[object Object]'"

Arrays

Arrays are turned into comma-separated lists:

escape([1, 2, 'c']);
// => "1, 2, 'c'"

Nested arrays are turned into grouped lists (useful for bulk inserts):

escape([
  [1, 2, 3],
  [4, 5, 6],
]);
// => '(1, 2, 3), (4, 5, 6)'

escapeId

Escapes an identifier (database, table, or column name).

escapeId(value: SqlValue, forbidQualified?: boolean): string
escapeId('id');
// => '`id`'

escapeId('table.column');
// => '`table`.`column`'

escapeId('i`d');
// => '`i``d`'

Qualified identifiers (with .) can be forbidden:

escapeId('id1.id2', true);
// => '`id1.id2`'

Arrays are turned into comma-separated identifier lists:

escapeId(['a', 'b', 't.c']);
// => '`a`, `b`, `t`.`c`'

format

Formats a SQL query by replacing ? placeholders with escaped values and ?? with escaped identifiers.

format(sql: string, values?: SqlValue | SqlValue[], stringifyObjects?: boolean, timezone?: Timezone): string
format('SELECT * FROM ?? WHERE id = ?', ['users', 42]);
// => 'SELECT * FROM `users` WHERE id = 42'

format('? and ?', ['a', 'b']);
// => "'a' and 'b'"

Triple (or more) question marks are ignored:

format('? or ??? and ?', ['foo', 'bar', 'fizz', 'buzz']);
// => "'foo' or ??? and 'bar'"

If no values are provided, the SQL is returned unchanged:

format('SELECT ??');
// => 'SELECT ??'

Objects in SET clauses

When stringifyObjects is falsy, objects used in SET or ON DUPLICATE KEY UPDATE contexts are automatically expanded into key = value pairs:

format('UPDATE users SET ?', [{ name: 'foo', email: '[email protected]' }]);
// => "UPDATE users SET `name` = 'foo', `email` = '[email protected]'"

format(
  'INSERT INTO users (name, email) VALUES (?, ?) ON DUPLICATE KEY UPDATE ?',
  ['foo', '[email protected]', { name: 'foo', email: '[email protected]' }]
);
// => "INSERT INTO users (name, email) VALUES ('foo', '[email protected]') ON DUPLICATE KEY UPDATE `name` = 'foo', `email` = '[email protected]'"

When stringifyObjects is truthy, objects are always stringified:

format('UPDATE users SET ?', [{ name: 'foo' }], true);
// => "UPDATE users SET '[object Object]'"

raw

Creates a raw SQL value that will not be escaped.

raw(sql: string): Raw
escape(raw('NOW()'));
// => 'NOW()'

escape({ id: raw('LAST_INSERT_ID()') });
// => '`id` = LAST_INSERT_ID()'

Only accepts strings:

raw(42); // throws TypeError

TypeScript

You can import the available types:

import type { Raw, SqlValue, Timezone } from 'sql-escaper';

Performance

Each benchmark formats 10,000 queries using format with 100 mixed values (numbers, strings, null, and dates), comparing SQL Escaper against the original sqlstring through hyperfine:

| Benchmark | sqlstring | SQL Escaper | Difference | | ---------------------------------------- | --------: | ----------: | ---------------: | | Select 100 values | 248.8 ms | 178.7 ms | 1.39x faster | | Insert 100 values | 247.5 ms | 196.2 ms | 1.26x faster | | SET with 100 values | 257.5 ms | 205.2 ms | 1.26x faster | | SET with 100 objects | 348.3 ms | 250.5 ms | 1.39x faster | | ON DUPLICATE KEY UPDATE with 100 values | 466.2 ms | 394.6 ms | 1.18x faster | | ON DUPLICATE KEY UPDATE with 100 objects | 558.2 ms | 433.9 ms | 1.29x faster |

  • See detailed results and how the benchmarks are run in the benchmark directory.

[!NOTE]

Benchmarks ran on GitHub Actions (ubuntu-latest) using Node.js LTS. Results may vary depending on runner hardware and runtime version.


Differences from sqlstring

  • Requires Node.js 12+ (the original sqlstring supports Node.js 0.6+)

[!TIP]

The Node.js 12+ requirement is what allows SQL Escaper to leverage modern engine optimizations and achieve the performance gains over the original.


Caution

Based on the original sqlstring documentation.

  • The escaping methods in this library only work when the NO_BACKSLASH_ESCAPES SQL mode is disabled (which is the default state for MySQL servers).

  • This library performs client-side escaping to generate SQL strings. The syntax for format may look similar to a prepared statement, but it is not — the escaping rules from this module are used to produce the resulting SQL string.

  • When using format, all ? placeholders are replaced, including those contained in comments and strings.

  • When structured user input is provided as the value to escape, care should be taken to validate the shape of the input, as the resulting escaped string may contain more than a single value.

  • NaN and Infinity are left as-is. MySQL does not support these values, and trying to insert them will trigger MySQL errors.

  • The string provided to raw() will skip all escaping, so be careful when passing in unvalidated input.


Security Policy

GitHub Workflow Status (with event)

Please check the SECURITY.md.


Contributing

See the Contributing Guide and please follow our Code of Conduct 🚀


Acknowledgements

  • Contributors
  • SQL Escaper is adapted from sqlstring (MIT), modernizing it with high performance, TypeScript support and multi-runtime compatibility.
  • Special thanks to Douglas Wilson for the original sqlstring project and its contributors.

License

SQL Escaper is under the MIT License.