# file: /Users/namanagarwal/venomQA/venomqa/domains/security/actions/owasp.py
# hypothesis_version: 6.151.5

[0.1, 30.0, 100, 429, 500, 1000, "' OR '1'='1", "'unsafe-eval'", "'unsafe-inline'", '*', '-1', '.NET exception', '/', '/api', '/api/auth', '/api/login', '/auth', '/forgot', '/login', '/otp', '/password', '/register', '/reset', '/signup', '/verify', '999999999', '999999999999', 'AWS_|AZURE_|GCP_', 'CORS Wildcard Origin', 'CWE-209', 'CWE-307', 'CWE-770', 'CWE-942', 'Cloud credentials', 'Data URIs Allowed', 'Debug mode enabled', 'Dependency path', 'Django settings', 'Exception in thread', 'GET', 'Generic stack trace', 'Invalid path', 'Java exception', 'Malformed request', 'N/A', 'OPTIONS', 'Origin', 'Origin: null', 'POST', 'PUT', 'Preflight request', 'Python stack trace', 'SQL query', 'Sensitive keyword', 'Server path', 'Stack trace:', 'System\\.Exception', 'Unsafe Eval Allowed', 'X-Custom-Header', '__proto__', 'admin', 'at .+\\(.+:\\d+:\\d+\\)', 'data:', 'date', 'deny', 'description', 'email', 'expected_value', 'expected_values', 'http://localhost', 'https://attacker.com', 'https://evil.com', 'id', 'invalid-date', 'invalid-uuid-format', 'limit', 'nosniff', 'not-an-email', 'null', 'page', 'password', 'permissions-policy', 'ratelimit-limit', 'ratelimit-remaining', 'reference', 'referrer-policy', 'remediation', 'retry-after', 'sameorigin', 'server', 'severity', 'test', 'text', 'title', 'true', 'username', 'x-aspnet-version', 'x-aspnetmvc-version', 'x-frame-options', 'x-powered-by', 'x-rate-limit-limit', 'x-ratelimit-limit', 'x-ratelimit-reset']