Module injection is a vulnerability that can be exploited by malicious actors to run arbitrary code on a system. This occurs when an application fails to properly validate user-supplied input, allowing attackers to embed malicious modules into the application's runtime environment. Successful module injection can give attackers full access over the