User input was observed to be included in the construction of Predicate logic, potentically allowing for predicate injection, where the logic of the predicate itself can be manipulated. If the predicate is used for security sensitive decisions, the impact will be notably higher. Likelihood: LOW Confidence: LOW CWE: - CWE-807: Reliance on Untrusted Inputs in a Security Decision