App Order Prod Key Stats
PassAudited by VirusTotal on May 11, 2026.
Overview
Type: OpenClaw Skill Name: app-order-prod-key-stats Version: 1.0.0 The skill contains a significant SQL injection vulnerability in the Python code template within SKILL.md. User-provided inputs for keywords and business sectors are directly interpolated into the SQL query string using f-strings without sanitization or the use of parameterized queries. While the skill is intended for business reporting on a specific database (rm-uf69co304tkv5htyd.mysql.rds.aliyuncs.com), the lack of input validation allows for potential unauthorized database manipulation or data exposure if the read-only restrictions are bypassed.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A crafted or accidental input could change the intended query, broaden the data returned, or attempt SQL injection against the order database.
User-controlled keyword and time values are inserted into SQL strings without parameter binding or strict validation, then executed against the database.
conditions = [f"(order_title LIKE '%{k}%' OR order_desc LIKE '%{k}%')" for k in keywords] ... create_time >= '{start_time}' AND create_time < '{end_time}' ... df = pd.read_sql(sql, conn)Use parameterized queries, strict date validation, an allowlist for business types, escaping for LIKE patterns, and query limits before executing against production data.
Users may not realize the skill will use local database credentials to access production order data when generating reports.
The skill uses a database password environment variable and defaults to a specific remote database host/user, while the supplied registry metadata says there are no required env vars or primary credentials.
'host': os.getenv('JIUSHI_DB_HOST', 'rm-uf69co304tkv5htyd.mysql.rds.aliyuncs.com'), ... 'user': os.getenv('JIUSHI_DB_USER', 'juss_dw_ro'), 'password': os.getenv('JIUSHI_DB_PASSWORD')Declare JIUSHI_DB_PASSWORD and related database configuration in metadata, document exactly what data is queried, and ensure the database account is narrowly scoped to read-only access for the intended table.
