Special Characters Skill
This skill tests handling of special characters in $ARGUMENTS placeholder.
Test cases covered:
-
HTML/XML special chars: < > & " '
-
Shell metacharacters: $ ` ; | & ( ) [ ] { }
-
Path traversal attempts: ../ ../../etc/passwd
-
SQL injection patterns: ' OR '1'='1
-
Command injection: ; rm -rf / ; $(whoami)
-
Unicode and emoji: 你好 🎉 émoji
Usage: $ARGUMENTS
Expected Behavior
The ContentProcessor should safely substitute arguments without:
-
Executing shell commands
-
Interpreting special characters
-
Allowing path traversal
-
Enabling injection attacks
All input should be treated as literal text.