Back to tags
Tag

Agent Skills with tag: sql-injection

7 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

security-auditor

Continuous security vulnerability scanning for OWASP Top 10, common vulnerabilities, and insecure patterns. Use when reviewing code, before deployments, or on file changes. Scans for SQL injection, XSS, secrets exposure, auth issues. Triggers on file changes, security mentions, deployment prep.

vulnerability-scanningOWASPsql-injectionXSS
ovachiever
ovachiever
81

SQLite Database Expert

Expert in SQLite embedded database development for Tauri/desktop applications with focus on SQL injection prevention, migrations, FTS search, and secure data handling

taurisql-injectiondatabase-securitydatabase-migrations
martinholovsky
martinholovsky
92

ln-621-security-auditor

Security audit worker (L3). Scans codebase for hardcoded secrets, SQL injection, XSS, insecure dependencies, missing input validation. Returns findings with severity (Critical/High/Medium/Low), location, effort, and recommendations.

static-analysisvulnerability-scanningsql-injectionxss
levnikolaevich
levnikolaevich
246

rails-ai:security

CRITICAL - Use when securing Rails applications - XSS, SQL injection, CSRF, file uploads, command injection prevention

ruby-on-railsweb-securityxsssql-injection
zerobearing2
zerobearing2
181

sql-injection-prevention

Prevent SQL injection attacks using prepared statements, parameterized queries, and input validation. Use when building database-driven applications securely.

sql-injectioninjection-attacksdatabase-securityinput-validation
aj-geddes
aj-geddes
301

SQL Injection Testing

This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through injection", "detect SQL injection flaws", or "exploit database query vulnerabilities". It provides comprehensive techniques for identifying, exploiting, and understanding SQL injection attack vectors across different database systems.

sql-injectionpenetration-testingvulnerability-assessmentdatabase-security
zebbern
zebbern
2,951263

SQLMap Database Penetration Testing

This skill should be used when the user asks to "automate SQL injection testing," "enumerate database structure," "extract database credentials using sqlmap," "dump tables and columns from a vulnerable database," or "perform automated database penetration testing." It provides comprehensive guidance for using SQLMap to detect and exploit SQL injection vulnerabilities.

sqlmapsql-injectionpenetration-testingdatabase-security
zebbern
zebbern
2,951263