What are the potential security risks associated with using addslashes() function in PHP for data sanitization?

The addslashes() function in PHP is not recommended for data sanitization as it may not provide sufficient protection against SQL injection attacks. It can also lead to double escaping issues if used incorrectly. It is better to use parameterized queries or prepared statements to prevent SQL injection vulnerabilities.

// Using parameterized queries for data sanitization
$stmt = $pdo->prepare("SELECT * FROM users WHERE username = :username");
$stmt->bindParam(':username', $username);
$stmt->execute();