skills/mukul975/anthropic-cybersecurity-skills/exploiting-sql-injection-with-sqlmap/Gen Agent Trust Hub
exploiting-sql-injection-with-sqlmap
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyautomates the execution of thesqlmaputility using thesubprocessmodule to perform security testing and database enumeration. It uses list-based arguments to prevent traditional shell command injection. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. In
scripts/agent.py, the output ofsqlmap(which contains data fetched from external, untrusted target web applications) is parsed and printed to the console without sanitization or the use of boundary markers. A malicious target database or web application could include instructions within its schema or data designed to manipulate the behavior of the AI agent reviewing the scan results. - Ingestion points:
scripts/agent.pyreadsstdoutfromsubprocess.runcalls tosqlmap(which contains data from the target system). - Boundary markers: Absent. The output is parsed and presented as raw strings in the generated report.
- Capability inventory: The skill has the capability to execute system commands via
sqlmapand access target networks. - Sanitization: Absent. No filtering or escaping is applied to the data extracted from the target system before it is returned to the agent.
- [DATA_EXFILTRATION]: The skill's primary function is to extract data from target databases (e.g., table dumps). This is the intended behavior for a penetration testing tool, but it should be used only on authorized targets.
Audit Metadata