# sqli
2 articlestagged with “sqli”
AI Application Security
Methodology for exploiting LLM application vulnerabilities: output handling injection (XSS, SQLi, RCE), authentication bypass, session manipulation, and integration-layer attacks.
application-securityxsssqlicommand-injectionauth-bypasssession-attackswebhooksllm-apps
Output Handling Exploits
Deep dive into XSS, SQL injection, command injection, SSTI, and path traversal attacks that weaponize LLM output as an injection vector against downstream systems.
xsssqlicommand-injectionsstipath-traversaloutput-handlingllm-appsinjection