skills/mukul975/anthropic-cybersecurity-skills/performing-second-order-sql-injection/Gen Agent Trust Hub
performing-second-order-sql-injection
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through the automated analysis of potentially attacker-controlled files.
- Ingestion points: The
scripts/agent.pyscript reads database dumps (JSON) and source code directories provided via command-line arguments. - Boundary markers: The script does not utilize boundary markers or delimiters when processing or reporting findings from external data.
- Capability inventory: The skill possesses file system read and write capabilities (
Path.read_text,Path.write_text) as implemented inscripts/agent.py. - Sanitization: No sanitization or validation is performed on the data extracted from the analyzed files before it is included in the JSON output report.
- [PROMPT_INJECTION]: There is a metadata discrepancy regarding the author's name, which is listed as 'mahipal' in the SKILL.md YAML frontmatter but appears as 'mukul975' in the LICENSE file and system context.
- [COMMAND_EXECUTION]: The documentation provides multiple examples of using
curlandsqlmapto interact with target web applications for testing and exploitation purposes. - [DATA_EXFILTRATION]: The skill describes techniques for out-of-band data exfiltration using DNS queries (e.g., via
xp_dirtree) to external domains as part of its exploitation examples.
Audit Metadata