sqlmap-advanced

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

Securityx2Malware
SecurityMEDIUM
references/tamper-reference.md

This is not supply-chain malware code; it is offensive-security operational guidance for running sqlmap with WAF-evasion tamper settings. It meaningfully enables SQL injection probing/evasion and logs results locally, so in a distribution/supply-chain context it represents a high misuse risk and should be treated as potentially dangerous content, even though the likelihood of covert malware embedded in this snippet is low.

Confidence: 82%Severity: 78%
SecurityMEDIUM
SKILL.md

该技能与其声明用途一致,但其用途本身是为 AI 代理提供完整的 SQL 注入利用与后渗透操作指南。未见明显恶意供应链或凭证窃取迹象,但它赋予代理高危进攻性安全能力与自主执行路径,应判定为高风险而非良性通用技能。

Confidence: 95%Severity: 91%
MalwareHIGH
references/advanced-usage.md

This fragment is an offensive exploitation command playbook for sqlmap. It explicitly enables remote OS command execution, sensitive file exfiltration, and persistent webshell deployment (backdoor) using a PHP system($_GET['cmd']) payload, plus advanced second-order injection and tuning/stealth options. If included in a distributed package/dependency, it would be a serious security red flag and likely facilitate intrusion rather than provide protective functionality.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:17 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fsqlmap-advanced%2F@a91d831734a2043cd867126cd0d32a8f0368bada