: Using \input{/etc/passwd} to trick the server into printing the contents of its system files directly into a PDF.
: Run the compilation process in a "jail" or isolated container so that even if an injection happens, the attacker can't access your host system.
🚀 LaTeX Injection - Payloads All The Things
: If shell-escape is enabled, an attacker can run system commands like \write18{ls -la} to list files on the server.
: Using packages like listings to fetch internal files or hit internal network URLs. 🛠️ How to Stay Safe
: Ensure your LaTeX compiler is running with --no-shell-escape to prevent system-level command execution.