exploit-sqli
Audited by Socket on Mar 30, 2026
5 alerts found:
AnomalySecurityx4This module is not executable malware; it is a static offensive SQL injection playbook containing highly actionable exploit payloads (including data extraction, timing inference, WAF bypass, and destructive stacked-query examples). The direct security risk is misuse facilitation rather than runtime compromise. In a software supply-chain context, its inclusion is suspicious/high-risk unless the project is explicitly a controlled security-testing/training tool with appropriate safeguards.
No executable malware is present in this snippet, but the content is a highly actionable, offensive NoSQL injection exploitation guide (including authentication bypass/blackbox extraction and a destructive Redis EVAL/Lua example). In a supply-chain context, distributing this file is a serious security-content risk even without direct system compromise within the file itself.
High-risk offensive security skill. Its capabilities are aligned with its stated purpose, and the sqlmap install path appears official, but the purpose itself is to enable an AI agent to detect and exploit SQL injection, enumerate and extract remote data, and potentially gain shell access. This is not confirmed malware, but it is a dangerous skill with strong misuse potential.
This file is a dual-use/offensive SQL injection payload generator. It does not show classic malware behaviors (no exfiltration, no command execution, no persistence), but it substantially enables exploitation by generating DBMS-specific SQLi payloads and by embedding user-provided custom SQL fragments without sanitization. If present in a supply-chain, it should be treated as high abuse potential and reviewed/controlled accordingly.
This module is an explicit active blind SQL injection probing tool. It constructs and sends malicious query payloads (including SLEEP-based time-delay) to operator-specified URLs and infers likely vulnerability from response characteristics and timing. While there is no evidence of stealth, persistence, credential theft, or third-party exfiltration, the capability itself is offensively intrusive and high-risk if distributed as a dependency or used without strict authorization. Additional implementation issues (missing json import, ur.parse typo, malformed main invocation) reduce execution reliability but do not change the clear intent of the network probing logic.