For example, if a hacker inserts non-JSON code into a string ... 21778:2017 with the goal of defining the syntax of valid JSON texts. JSON consists of arrays and objects, as well as names and value ...