Here is the problem. You trust the end user binaries that will trigger MySQL queries. This means, without a doubt, that a smart user can βtake controlβ and run queries directly.
There are things you can do to improve the situation. It looks like you are on a local network. Why can't you give each user their own database user? This means that authentication (a) took care of you, and (b) you can use the "real" MySQL permissions to limit what harm they can do. In addition, you can use stored procedures and give them only access to procs, which really limits their actions.
You can also consider rewriting as a web application, where you process everything on the server out of reach.
However, is this really a problem, or are you just theoretical?
gahooa
source share