Home › Glossary › Input validation

Input validation

Scripts often accept filenames, hostnames, IP addresses, usernames, or paths, and if those values are not checked, the script may behave unpredictably or become vulnerable to command injection, path traversal, or destructive targeting.

Used in courses

  • IT and Cybersecurity: Systems, Operations, and Career Pathways
  • IT Fundamentals: Cyber Hygiene, Networking, and Cloud Essentials

Keep exploring

  • Browse the glossary hub
  • Browse careers
  • Find a course