OK.  this morning I created a working security breach using the 
ability of  to escape things in postgres.  (If you're using 
unencrypted passwords I can view them, if you're using encrypted I 
can only view the encrypted version)
I know about DoubleApos.  are there possibly any inserts that don't 
use it?
and for a change this small is it still recommended to build a patch 
and upload it?
Here is the new DoubleApos function to escape s.
(escaped for pg. if reading in email reduce the s by one half)
proc DoubleApos {string} {
    regsub -all ' "$string" '' result1
    regsub -all {\} "$result1" {\\} result
    return $result
}