Database custom query security

Hi, I was wondering if there is an automatic escaping / sanitization of the variables we use in custom query (either by using :P1 or directly {{my_var}} in the request)?

Community Page
Last updated: