# file: /Users/namanagarwal/venomQA/venomqa/domains/security/actions/injection.py
# hypothesis_version: 6.151.5

[0.3, 5.0, 30.0, 100, 1000, '.NET OLE error', '.NET SQL error', '<iframe', '<img', '<script>', '<svg', 'A03:2021 - Injection', 'CWE-78', 'CWE-79', 'CWE-89', 'Directory of', 'GET', 'Linux version', 'MSSQL JDBC error', 'MSSQL OLE error', 'MSSQL driver error', 'MSSQL syntax error', 'MySQL error', 'MySQL syntax error', 'N/A - Code analysis', 'ORA-\\d{5}', 'OS Command Injection', 'Oracle PL/SQL error', 'Oracle error', 'PATCH', 'PDO SQL error', 'PLS-\\d{5}', 'POST', 'PUT', 'PostgreSQL error', 'PostgreSQL warning', 'Reflected XSS', 'SQL syntax error', 'SQLITE_ERROR', 'SQLSTATE\\[\\d+\\]', 'SQLite error', 'System\\.Data\\.OleDb', 'Unix /etc/passwd', 'Unix id output', 'Unix ls -l output', 'Unix ls output', 'Unix uname output', 'Volume Serial Number', 'Warning: pg_', 'Windows dir output', 'Windows system.ini', 'Windows win.ini', '\\.innerHTML\\s*=', '\\.outerHTML\\s*=', '\\[extensions\\]', '\\[fonts\\]', 'bin:.*:/bin', 'command', 'document.URL usage', 'document.write()', 'document.writeln()', 'document\\.URL', 'document\\.location', 'document\\.write\\s*\\(', 'drwx', 'eval()', 'eval\\s*\\(', 'gid=\\d+', 'headers', 'innerHTML assignment', 'javascript:', 'json', 'location assignment', 'location\\.href\\s*=', 'location\\s*=', 'macOS uname output', 'mysql_fetch', 'onclick=', 'onerror=', 'onload=', 'onmouseover=', 'outerHTML assignment', 'params', 'pg_query', 'root:.*:0:0:', 'sql', 'sql syntax', 'text', 'timeout', 'total \\d+', 'uid=\\d+', 'window\\.location', 'xss']