Configuration
Injection detection rules in policy.yaml:
# policy.yaml
injection_detection:
sql:
enabled: true
patterns:
- "UNION SELECT"
- "OR 1=1"
- "DROP TABLE"
- "'; --"
xss:
enabled: true
patterns:
- "
INJ-001BLOCKED
SQL Injection - UNION SELECT
Attack Attempt
curl -X GET "http://localhost:8080/search?q=' UNION SELECT * FROM users --"
Expected Response
HTTP/1.1 400 Bad Request
Content-Type: application/json
{"error": "SQL injection pattern detected", "code": "SQL_INJECTION_BLOCKED"}
Classic SQL injection patterns including UNION SELECT, OR 1=1, and comment sequences are detected and blocked in query parameters, form fields, and request bodies.
INJ-005BLOCKED
SQL Injection - OR 1=1
Attack Attempt
curl -X POST -d "username=admin' OR '1'='1" http://localhost:8080/login
Boolean-based SQL injection attempts are detected regardless of quote style or spacing variations.
INJ-010BLOCKED
XSS - Script Tag Injection
Attack Attempt
curl -X POST -d "comment=<script>alert('xss')</script>" http://localhost:8080/comment
Expected Response
HTTP/1.1 400 Bad Request
Content-Type: application/json
{"error": "XSS pattern detected", "code": "XSS_BLOCKED"}
Cross-site scripting attempts including script tags, event handlers, and javascript: URIs are blocked.
INJ-015BLOCKED
XSS - Event Handler Injection
Attack Attempt
curl -X POST -d "name=<img src=x onerror=alert(1)>" http://localhost:8080/profile
HTML event handler attributes (onerror, onclick, onload) are detected and blocked.
INJ-020BLOCKED
Command Injection
Attack Attempt
curl -X POST -d "filename=test.txt; rm -rf / #" http://localhost:8080/upload
Expected Response
HTTP/1.1 400 Bad Request
Content-Type: application/json
{"error": "Command injection pattern detected", "code": "COMMAND_INJECTION_BLOCKED"}
Shell command injection patterns including semicolons, pipes, and command chaining are detected and blocked.