skills/mukul975/anthropic-cybersecurity-skills/exploiting-nosql-injection-vulnerabilities/Gen Agent Trust Hub
exploiting-nosql-injection-vulnerabilities
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill's documentation and prerequisites recommend installing third-party tools
nosqlmapandnosqliviapipandgit clone. These repositories (codingo/NoSQLMap,Charlie-belmer/nosqli) are not part of the established trusted vendors list. - [REMOTE_CODE_EXECUTION]: The exploitation workflow in SKILL.md (Step 5) involves cloning an external repository and immediately running its installation script (
python setup.py install), which executes code from a remote, unverified source. - [COMMAND_EXECUTION]: The skill provides Python scripts (
scripts/agent.pyandscripts/process.py) and command-line examples usingcurlthat perform active network requests and injection attempts against external URLs provided by the user. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes responses from untrusted external targets without sufficient sanitization.
- Ingestion points: HTTP response bodies read via
requests.getandrequests.postinscripts/agent.pyandscripts/process.py. - Boundary markers: None identified in the processing logic.
- Capability inventory: Network access via
requestsand file write access viaopen()in reporting functions. - Sanitization: Minimal escaping is performed only for regex special characters in
scripts/process.py.
Audit Metadata