While there may be some overlap with other categories, triple injection attacks stand out in that they can result from loading declarative rather than executable data, either through replacing or corrupting data, or through code injection of triple data.