sqli-sql-injection
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The playbook contains extensive documentation on executing OS commands through SQL injection. Examples include MSSQL's
xp_cmdshell, Oracle'sDBMS_SCHEDULER, and MySQL'ssystem()via UDF. These are explicitly described as escalation paths from database access to system control.\n- [DATA_EXFILTRATION]: Provides comprehensive methods for extracting sensitive database information. This includes UNION-based extraction and out-of-band exfiltration via DNS (e.g.,UTL_INADDR), SMB (e.g.,LOAD_FILEwith UNC paths), and HTTP (e.g.,UTL_HTTP). Payloads utilizeattacker.comas a placeholder for the exfiltration listener.\n- [REMOTE_CODE_EXECUTION]: Describes multiple vectors for remote code execution, such as using SQLite to write webshells to the web root or persistent reverse shells to crontabs. It also details the use of SQLMap's--os-shelland--os-pwnfunctionalities for automated exploitation.\n- [SAFE]: While the skill contains many patterns associated with malicious activity (e.g., reverse shell strings, credential harvesting scripts), these are appropriately contextualized as educational examples within an offensive security playbook. No malicious instructions, hidden backdoors, or unauthorized data access attempts were found in the skill's own logic.
Audit Metadata