Best Practices for Securing API Endpoints from Injection