Building a SQL Injection Game

September 2025

Back to Resume | Back to Blog | GitHub

Overview

As part of expanding my cloud resume portfolio, I wanted a quick, fun project to demonstrate security awareness without adding backend complexity. The result: a SQL Injection Game! It's a simple chat box where users try SQL injection attempts (e.g., "DROP TABLE users;"), and a bot detects them with regex, roasts the user snarkily (with emojis for extra fun), and logs attempts to the console. Everything runs client-side on my static S3-hosted site—no real database, just string matching for common attacks. Time spent: about 20 minutes, as planned.

What I Built

Deployment: Added files to GitHub Actions for S3 upload and CloudFront invalidation—no Terraform changes needed.

What I Learned

Hiccups and Troubleshooting

Minimal issues since it was frontend-only:

No major deployment snags, but as always, double-checked YAML indentation in deploy.yml (use spaces!), GitHub Secrets for AWS keys, and IAM permissions (e.g., s3:PutObject, cloudfront:CreateInvalidation) to prevent past errors like failed uploads.

Why It's Cool for a Cloud Resume

This project adds a playful, interactive element to my portfolio, showcasing quick prototyping and security concepts without heavy lifting. It highlights my ability to build engaging frontend features on a static site, ties into cloud security (simulating SQLi defense), and demonstrates CI/CD integration via GitHub Actions. Plus, it's a conversation starter for interviews—proving I can blend humor with tech skills!