Since its 0.53 release, naxsi comes with a predefined set of rules with the following id:
1  - “weird request” : This a generic exception used for improperly formatted requests.2  - “big request” : Request is too big and has been buffered to disk by nginx.10 - “uncommon hex encoding” : Encoding suggests this might be an escape attempt.11 - “uncommon content-type” : Content-type of BODY is unknown / cannot be parsed.12 - “uncommon URL” : URL is malformed13 - “uncommon post format” : malformed boundary or content-disposition14 - “uncommon post boundary” : BODY boundary line is malformed, or boundary breaks RFC15 - invalid JSON - gets parsed when application/json is detected (experimental as of summer 2014)16 - “empty body” : POST with empty BODY, available since naxsi 0.53-1, was merged with id:11 before.17 - “Libinjection SQL” : Libinjection SQL detection was triggered.18 - “Libinjection XSS” : Libinjection XSS detection was triggered.Naxsi ships with a basic core-rule-set that protects against common attacks. Those Core-Rules should always be loaded.