Skill Wiki v0.1.0
principle @community/principle-owasp-injection

Owasp Injection

User-supplied input must never be concatenated into interpreter commands or queries.…

Skill
@community
Domain
security
Version
1.0.0
Quality
4.0
Edges
3 out · 9 in
Tokens
127/317/542
$ prime install @community/principle-owasp-injection

Projection

Always in _index.xml · the agent never has to ask for this.

OwaspInjection [principle] v1.0.0

OWASP Top 10 A03:2021 — injection vulnerabilities (SQL, NoSQL, OS command, LDAP, SSTI) occur when untrusted data is sent to an interpreter as part of a command or query.

User-supplied input must never be concatenated into interpreter commands or queries. Use parameterized queries / prepared statements for SQL, structured APIs for OS commands, and output encoding for HTML/template contexts. Treat all external input as untrusted regardless of origin.

Source

prime-system/examples/frontend-design/primes/compiled/@community/principle-owasp-injection/atom.yaml

Compiled at 2026-05-07