Detect and analyze SQL injection vulnerabilities in application code and database queries. Use when you need to scan code for SQL injection risks, review query construction, validate input sanitization, or implement secure query patterns. Trigger with phrases like "detect SQL injection", "scan for SQLi vulnerabilities", "review database queries", or "check SQL security".
Scans application code for SQL injection vulnerabilities by analyzing query construction and input validation. Use when you need to detect SQLi risks, review database queries, or implement secure parameterized query patterns.
/plugin marketplace add jeremylongshore/claude-code-plugins-plus-skills/plugin install sql-injection-detector@claude-code-plugins-plusThis skill is limited to using the following tools:
assets/README.mdassets/sqli_payloads.jsonreferences/README.mdreferences/critical-findings.mdreferences/errors.mdreferences/examples.mdreferences/implementation.mdscripts/README.mdscripts/sqli_exploit.pyscripts/sqli_remediate.pyscripts/sqli_scan.pyThis skill provides automated assistance for the described functionality.
Before using this skill, ensure:
See {baseDir}/references/implementation.md for detailed implementation guide.
The skill produces:
Primary Output: SQL injection vulnerability report saved to {baseDir}/security-reports/sqli-scan-YYYYMMDD.md
Report Structure:
# SQL Injection Vulnerability Report
Scan Date: 2024-01-15
Application: E-commerce Platform
Framework: Django 4.2
## Error Handling
See `{baseDir}/references/errors.md` for comprehensive error handling.
## Examples
See `{baseDir}/references/examples.md` for detailed examples.
## Resources
- SQL Injection Prevention Cheat Sheet: https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html
- OWASP Top 10 - Injection: https://owasp.org/www-project-top-ten/
- CWE-89: SQL Injection: https://cwe.mitre.org/data/definitions/89.html
- CAPEC-66: SQL Injection: https://capec.mitre.org/data/definitions/66.html
- Django Security: https://docs.djangoproject.com/en/stable/topics/security/
Use when working with Payload CMS projects (payload.config.ts, collections, fields, hooks, access control, Payload API). Use when debugging validation errors, security issues, relationship queries, transactions, or hook behavior.