database-query

Fail

Audited by Socket on Feb 16, 2026

2 alerts found:

Obfuscated FileSecurity
Obfuscated FileHIGH
query.py

This module is not overtly malicious, but it contains clear insecure coding patterns that enable SQL injection (interpolation of user-controlled table names and values into SQL). It also lacks proper resource management and contains a syntax error. Recommend: fix by using parameterized queries for values, validate or whitelist table names (do not interpolate identifiers), enforce type-checking for IDs, use context managers to close connections, and correct the syntax error. Treat the code as insecure until fixed.

Confidence: 98%
SecurityMEDIUM
_expected.json

The descriptor clearly documents critical SQL injection risks: user inputs are concatenated into SQL queries in functions such as search_users and get_user_by_id despite claimed parameterized queries. This yields a high-security risk (possible data exfiltration and tampering). Treat the module as unsafe until queries are rewritten to use proper parameterization and input validation.

Confidence: 80%Severity: 80%
Audit Metadata
Analyzed At
Feb 16, 2026, 12:34 AM
Package URL
pkg:socket/skills-sh/cisco-ai-defense%2Fskill-scanner%2Fdatabase-query%2F@ec0b993733a53558821ef959b6e00e8ea7094964