skills/mukul975/anthropic-cybersecurity-skills/exploiting-sql-injection-vulnerabilities/Gen Agent Trust Hub
exploiting-sql-injection-vulnerabilities
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The documentation in
SKILL.mdprovides instructions for executing powerful commands using tools likesqlmap, specifically highlighting the use of the--os-shellflag to attempt remote command execution on the target host through database vulnerabilities. - [EXTERNAL_DOWNLOADS]: The utility script
scripts/agent.pyrequires the third-partyrequestslibrary to be installed from an external package registry (e.g., PyPI). - [DATA_EXFILTRATION]: The
agent.pyscript initiates network requests (GET and POST) to arbitrary, user-defined URLs to deliver SQL injection payloads and retrieve data from the target system's database responses. - [SAFE]: The Python script explicitly disables SSL certificate verification by setting
verify=Falsein its HTTP requests. While this is insecure for production environments, it is a documented practice for penetration testing tools to allow traffic interception through security proxies. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted data from external web server responses in
scripts/agent.py. The script reads the response body to identify database error patterns and includes these snippets in a generated JSON report. This creates a surface where malicious instructions embedded in a target's response could potentially influence the agent when it interprets the assessment results. (Ingestion points:scripts/agent.pyresponse processing; Boundary markers: None; Capability inventory: Network requests and local file writing; Sanitization: None).
Audit Metadata