Docs / Detector Reference

Detector Reference

One page per detector. Each follows the same five-section template: what it catches, sample payload (before / after), configuration knobs, how to disable, references to OWASP/CWE/MITRE. Use this as a quick scan when investigating a blocked request.

Injection

DetectorWhat it catchesReference
XSSScript tags, event handlers, javascript:, SVG onloadOWASP XSS
SQL InjectionKeywords, boolean logic, time-based blindOWASP SQLi
NoSQL Injection35 MongoDB operators ($gt, $where, ...)CWE-943
Command InjectionShell metacharacters, subshells, ${IFS} bypassCWE-78
Path Traversal../, encoded variants, NFKC fullwidth bypassCWE-22
Prototype Pollution__proto__, constructor, 7 dangerous keysCWE-1321

Template + XML injection

DetectorWhat it catchesReference
SSTIJinja2 {{, Twig, ERB, Pug, Python dunder chainsCWE-1336
XXEDOCTYPE, ENTITY, SYSTEM / PUBLIC, parameter entitiesCWE-611
LDAP InjectionFilter syntax injection, escape sequencesCWE-90
XPath InjectionXPath predicate manipulationCWE-643

Auth, request shape, output

DetectorWhat it catchesReference
CSRFMissing or invalid double-submit + HMAC tokenCWE-352
SSRFPrivate IPs, cloud metadata, IP encoding tricks, DNS TOCTOUCWE-918
Open RedirectExternal hosts, javascript:, protocol-relative URLsCWE-601
Header InjectionCRLF in header values, response splitting, null bytesCWE-113
HPP (Parameter Pollution)Duplicate query/body keysCWE-235

AI-era detectors (v1.6)

DetectorWhat it catchesReference
Prompt Injection (V32)28 jailbreak signatures + 5 v1.6 agent toolcall patternsOWASP LLM01
Modern Deserialization (V33)pickle, FastJSON, PHP, Ruby Marshal, .NET BinaryFormatter markersCWE-502
GraphQL Abuse (V34)Depth, introspection, alias bomb, fragment cycleCWE-770

Page template

Every detector page below carries the same five sections:

  1. What it catches — one-paragraph description of the threat class
  2. Sample payload — before / after string transformation, or block decision
  3. Configuration — options object, defaults, JSON shape
  4. Disable / dry-run — explicit { block: false } / onSanitize example
  5. References — OWASP, CWE, MITRE ATT&CK, relevant CVEs

Every detector runs on top of NFKC normalization + a multi-decode chain (v1.6). Fullwidth and encoded variants of payloads reach the detector as their canonical ASCII form. See Bypass resistance for the engine details.