A tweet about SQL injection tips mentioned using -v 3 on sqlmap to identify the type of payload blocked by a WAF and then selecting the best tamper to bypass it. This technique can be useful for bypassing WAF protections for SQL injection vulnerabilities. It is important to understand the WAF's behavior and select appropriate tampering techniques to evade detection.