DANGEROUS_SHELL_PATTERNS = (
'$(', '`', "$'", '\n', '\r', '\t', '<(', '>(', '<<<', '<<', '>>'Literal substrings that indicate shell injection risk.
Used by contains_dangerous_patterns to reject commands that embed arbitrary
execution via redirects, substitution operators, or control characters — even
when the base command is on the allow-list.