ECHO Admin Command / SQL Injection / Jinja SSTI Template Injection - ATR-2026-00407 (1d01240b-adaa-5ff7-bd81-5f6a7d6d9187)
Detects three exploitation.py injection variants. ECHO template injection frames the model as an echo-command tester and embeds Jinja {{...}} SSTI payloads after ECHO:. SQL injection directs the model to execute DROP/INSERT/SELECT statements with SUCCESS/FAILURE response markers. The "garak pwnd" literal appears in SQL INSERT payloads. From NVIDIA garak exploitation probe JinjaTemplatePythonInjection, SQLInjectionSystem, SQLInjectionEcho classes.