For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/def-000-2v3.md. A documentation index is available at /llms.txt.

HTTP requests containing command injection patterns

Goal

Detect HTTP requests whose query parameters contain command-injection-style patterns, including when the server returns a successful response.

Strategy

This rule monitors OCSF HTTP activity (@ocsf.class_uid:4002) for suspicious sequences in @ocsf.http_request.url.query_string, grouped by @ocsf.src_endpoint.ip, and correlates with successful HTTP status codes where applicable.

Triage and response

  • Confirm whether traffic from {{@ocsf.src_endpoint.ip}} is expected (approved scanning or internal testing).
  • Review path, user agent, and application context to see whether payloads may have been executed or only probed.
  • If the activity is unauthorized, follow your incident response process.