---
title: HTTP requests containing command injection patterns
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > OOTB Rules > HTTP requests containing command
  injection patterns
---

# HTTP requests containing command injection patterns
Classification:attackTactic:[TA0001-initial-access](https://attack.mitre.org/tactics/TA0001)Technique:[T1059-command-and-scripting-interpreter](https://attack.mitre.org/techniques/T1059) 
## Goal{% #goal %}

Detect HTTP requests whose query parameters contain command-injection-style patterns, including when the server returns a successful response.

## Strategy{% #strategy %}

This rule monitors OCSF HTTP activity (`@ocsf.class_uid:4002`) for suspicious sequences in `@ocsf.http_request.url.query_string`, grouped by `@ocsf.src_endpoint.ip`, and correlates with successful HTTP status codes where applicable.

## Triage and response{% #triage-and-response %}

- Confirm whether traffic from `{{@ocsf.src_endpoint.ip}}` is expected (approved scanning or internal testing).
- Review path, user agent, and application context to see whether payloads may have been executed or only probed.
- If the activity is unauthorized, follow your incident response process.
