Input validation
Scripts often accept filenames, hostnames, IP addresses, usernames, or paths, and if those values are not checked, the script may behave unpredictably or become vulnerable to command injection, path traversal, or destructive targeting.