Back to skill
Skillv1.0.0
ClawScan security
Sql Injection Detection And Exploitation · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 29, 2026, 11:44 AM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's instructions and artifacts are internally consistent with a SQL injection penetration-testing / code-review guide; it requests no unrelated credentials or installs, but it contains explicit offensive techniques (exfiltration, OS command execution) that must only be used in authorized test scopes.
- Guidance
- This skill is coherent for authorized penetration testing and secure code review, but it contains explicit payloads and techniques that can extract data, cause delays, or execute OS commands if used against live systems. Only install or run this skill when you have written scope approval and a safe target environment (preferably a staging/test replica). Do not provide production credentials or attacker-controlled endpoints to the agent. Consider disabling autonomous invocation for this skill if you do not want the agent to run tests without manual confirmation, and ensure logging, monitoring, and backups are in place before any active testing. If you need a lower-risk alternative, use passive analysis or code-review-only workflows that avoid live exploitation steps.
- Findings
[no_findings] expected: The static regex scanner found no patterns. That's expected because this is an instruction-only skill (no code files) and the payloads/techniques are contained in prose and reference docs.
Review Dimensions
- Purpose & Capability
- okName and description match the content: the SKILL.md and reference file provide detection, fingerprinting, UNION- and blind-based extraction, filter bypass, out-of-band exfiltration, and OS-command escalation techniques expected for SQLi testing. No unrelated binaries, env vars, or installs are requested.
- Instruction Scope
- noteInstructions explicitly teach offensive techniques including blind/time-based inference, UNION extraction, out-of-band DNS/HTTP exfiltration, and platform-specific OS-command execution (xp_cmdshell, UTL_HTTP, SELECT INTO OUTFILE). These are coherent with the stated purpose (penetration testing and code review) but are inherently high-risk and could be misused if applied outside an authorized scope. The SKILL.md does include a written-authorization admonition and backup recommendation.
- Install Mechanism
- okInstruction-only skill with no install spec and no shipped code. This minimizes disk-write/installation risk. The regex scanner had nothing to analyze (expected for an instruction-only skill).
- Credentials
- okThe skill does not request environment variables, credentials, or config paths. It references database privileges and attacker-controlled endpoints only as operational concepts/examples rather than as required secrets. Requested access is proportional to a manual testing workflow.
- Persistence & Privilege
- okalways is false, no install, no attempt to modify other skills or system-wide settings. The skill can be invoked autonomously by the agent by default (normal platform behavior) but does not request elevated permanence.
