Skip to main content

Sanitizing input variables and recommended ID filters

Since the inputs into the agttelnet , agtssh and agtdos scripted connectors can come from untrusted external sources, Bravura Security recommends putting in safe guards to mitigate the risk of injection attacks. The script writer should take extra care to both filter out potentially nefarious user IDs as well as properly escaping input variables before passing them to shell commands.

Characters such as ;&|<>'"()*# should be looked for in user IDs and filtered out during listing so they don’t even make it to the Bravura Security Fabric system. In addition (or if these characters are required), the SSH script should ensure that they are properly escaped before passing them into the shell. This will avoid injection attacks which could compromise your system.