I have code that has been flagged as vulnerable to CWE-78 by Veracode static analysis.
In all of the whitepapers I find on the vulnerability, they mention special elements, but none of them actually say what the special elements are.
On the windows platform, I recognize that & and && are command separators. Would validating against a regex that looks for instances of & and && be sufficient to satisfy the static analysis?