SQL injection is not applicable in your case because you are not using a database for your site. But you must consider other security issues for your site, such as crossite scripting .
If you are using a variable from GET, consider the url below:
index.php?myvar=<script>alert(document.cookie);</script>
Hackers can provide the above url in several ways: hex, utf, etc.
The bad guy can change your GET variables to perform XSS attacks. XSS is the root of many security holes. You should also consider this.
If you expect a numeric type from GET var, consider the code below:
$myvar = (int) $_GET['your_var'];
You should use htmlentities to prevent XSS attacks.
Sarfraz
source share