The vulnerability exists in the asyncmy.converters module, specifically within the escape_dict function. This function is responsible for preparing Python dictionaries for use in SQL queries. The analysis of the source code for asyncmy/converters.pyx reveals that while dictionary values are properly escaped, the keys are not. The function escape_dict iterates over the dictionary items and applies escaping only to the values, leaving the keys untouched. This flaw can be exploited if an attacker can supply a dictionary with specially crafted keys, which will then be incorporated directly into the SQL query, leading to SQL injection. The escape_item function is also identified as vulnerable because it acts as a dispatcher, and when it receives a dictionary, it directs it to the flawed escape_dict function. The vulnerability is confirmed by the GitHub issue #134 in the long2ice/asyncmy repository, which explicitly points out this flaw. Since there is no patched version available yet, the code from the latest version serves as evidence of the vulnerability.