# file: /Users/namanagarwal/venomQA/venomqa/security/sanitization.py
# hypothesis_version: 6.151.5

[500, 10000, '\x00', '$', '&', '&#x?[0-9a-f]+;', "'", '(', ')', '--\\s*$', '..', '/', '/\\*.*?\\*/', ';', '<', '<\\s*base', '<\\s*embed', '<\\s*form', '<\\s*iframe', '<\\s*link', '<\\s*meta', '<\\s*object', '>', 'ALTER', 'BEGIN', 'BENCHMARK\\s*\\(', 'Base tag injection', 'Boolean injection', 'COMMIT', 'CREATE', 'CSS expression', 'CURSOR', 'DATABASE', 'DECLARE', 'DELETE', 'DROP', 'Data URL injection', 'EXEC', 'EXECUTE', 'Embed injection', 'Event handler', 'FALSE', 'FROM', 'FUNCTION', 'File injection', 'File read injection', 'Form injection', 'GRANT', 'GROUP', 'HAVING', 'HTML entity encoding', 'INDEX', 'INSERT', 'INTO', 'INTO\\s+OUTFILE', 'Iframe injection', 'JOIN', 'JavaScript protocol', 'LIMIT', 'LOAD_FILE', 'Link tag injection', 'Meta tag injection', 'NULL', 'OFFSET', 'ORDER', 'Object injection', 'PROCEDURE', 'Path cannot be empty', 'REVOKE', 'ROLLBACK', 'SELECT', 'SET', 'SLEEP\\s*\\(', 'SQL comment block', 'Script tag', 'String injection', 'TABLE', 'TRIGGER', 'TRUE', 'TRUNCATE', 'Time-based injection', 'UNION', 'UNION injection', 'UPDATE', 'URL cannot be empty', 'VALUES', 'VBScript protocol', 'VIEW', 'WAITFOR\\s+DELAY', 'WHERE', '[REDACTED]', '[\\x00-\\x1f\\x7f]', '[^\\w\\-.]', '[^a-zA-Z0-9_]', '\\', '\\1 ***REDACTED***', '\\1=***REDACTED***', '\\\\', '\\n', '\\r', '_', '`', 'access_key', 'amqp://***:***@', 'api_key', 'apikey', 'args', 'auth', 'authorization', 'cookie', 'credential', 'data', 'data\\s*:\\s*text/html', 'expression\\s*\\(', 'file', 'http', 'https', 'javascript', 'javascript\\s*:', 'mongodb://***:***@', 'msg', 'mysql://***:***@', 'password', 'pg_sleep', 'private_key', 'redis://***:***@', 'secret', 'session', 'token', 'vbscript', 'vbscript\\s*:', 'xp_cmdshell', '|']