Injection Detection Configuration
Injection detection is enabled by default and scans all input locations:
# config.yaml
injection_detection:
enabled: true
scan_locations:
- query_parameters
- path_parameters
- headers
- body
patterns:
sql_injection: true
xss: true
command_injection: true
ldap_injection: true
xpath_injection: true
INJ-001BLOCKED
SQL Injection - UNION SELECT
Attack Attempt
curl "http://localhost:8080/users?search=' UNION SELECT * FROM passwords --"
Expected Response
HTTP/1.1 400 Bad Request
{"error": "SQL injection pattern detected", "code": "SQL_INJECTION_BLOCKED", "location": "query.search"}
Classic SQL injection patterns including UNION SELECT are detected and blocked in all input fields.
INJ-005BLOCKED
SQL Injection - OR 1=1
Attack Attempt
curl -X POST -d '{"username": "admin\' OR \'1\'=\'1"}' http://localhost:8080/login
Boolean-based SQL injection attempts are detected regardless of quote style or spacing.
INJ-010BLOCKED
XSS - Script tag injection
Attack Attempt
curl -X POST -d '{"comment": "<script>alert(document.cookie)</script>"}' http://localhost:8080/comments
Expected Response
{"error": "XSS pattern detected", "code": "XSS_BLOCKED"}
Cross-site scripting attempts using script tags are blocked before reaching the backend.
INJ-015BLOCKED
XSS - Event handler injection
Attack Attempt
curl -X POST -d '{"bio": "<img src=x onerror=alert(1)>"}' http://localhost:8080/profile
HTML event handlers (onerror, onclick, onload) are detected and blocked.
INJ-020BLOCKED
Command Injection
Attack Attempt
curl -X POST -d '{"filename": "test.txt; rm -rf / #"}' http://localhost:8080/files
Expected Response
{"error": "Command injection pattern detected", "code": "CMD_INJECTION_BLOCKED"}
Shell command injection patterns (;, |, &&, ||, $()) are detected and blocked.
INJ-025BLOCKED
LDAP Injection
Attack Attempt
curl -X POST -d '{"username": "*)(uid=*))(|(uid=*"}' http://localhost:8080/search
LDAP injection patterns attempting to manipulate LDAP queries are detected and blocked.