# command-injection
3 articlestagged with “command-injection”
CWE Mapping for AI-Generated Vulnerabilities
Common AI-generated vulnerabilities mapped to CWE identifiers with real examples: SQL injection (CWE-89), XSS (CWE-79), path traversal (CWE-22), command injection (CWE-78), and hardcoded credentials (CWE-798).
cwesql-injectionxsspath-traversalcommand-injectionhardcoded-credentialsvulnerability-patterns
AI Application Security
Methodology for exploiting LLM application vulnerabilities: output handling injection (XSS, SQLi, RCE), authentication bypass, session manipulation, and integration-layer attacks.
application-securityxsssqlicommand-injectionauth-bypasssession-attackswebhooksllm-apps
Output Handling Exploits
Deep dive into XSS, SQL injection, command injection, SSTI, and path traversal attacks that weaponize LLM output as an injection vector against downstream systems.
xsssqlicommand-injectionsstipath-traversaloutput-handlingllm-appsinjection