Try to enter attack vectors such as XSS or SQL injection in the input box, and check whether the system can correctly filter or escape these characters
Try to enter scripts or other dangerous codes in the input box to check whether the system has security holes. Test case test value