From latestaiagents
OWASP A01 - Injection Prevention. Use this skill when reviewing code for SQL injection, NoSQL injection, command injection, LDAP injection, or any user input that reaches databases, shells, or interpreters. Activate when: SQL query, database query, user input, command execution, shell command, exec, eval, system call, parameterized query.
npx claudepluginhub latestaiagents/agent-skills --plugin skills-authoringThis skill uses the workspace's default tool permissions.
**Prevent SQL, NoSQL, Command, and other injection attacks by validating and sanitizing all user input.**
Prevents SQL, NoSQL, and command injection using parameterized queries, input validation with Zod, and safe child process spawning. For user-param DB queries, ORMs like Prisma/TypeORM, MongoDB, and CLI wrappers.
Detects SQL injection vulnerabilities by tracing user inputs through code to database queries, flagging unsafe patterns like concatenation and unparameterized ORMs. Scans frameworks including Django, Rails, Express, Go.
Detects SQL injection vulnerabilities and provides step-by-step guidance, best practices, code generation, and validation for input sanitization and secure coding.
Share bugs, ideas, or general feedback.
Prevent SQL, NoSQL, Command, and other injection attacks by validating and sanitizing all user input.
| Type | Danger | Common Locations |
|---|---|---|
| SQL Injection | CRITICAL | Database queries, ORMs with raw queries |
| NoSQL Injection | CRITICAL | MongoDB, Redis, Elasticsearch queries |
| Command Injection | CRITICAL | Shell exec, system calls, child_process |
| LDAP Injection | HIGH | Directory service queries |
| XPath Injection | HIGH | XML document queries |
| Expression Language | HIGH | Template engines, eval() |
// VULNERABLE - String concatenation
const query = "SELECT * FROM users WHERE id = " + userId;
const query = `SELECT * FROM users WHERE name = '${userName}'`;
// VULNERABLE - Format strings
query = "SELECT * FROM users WHERE id = %s" % user_id
// VULNERABLE - String interpolation in ORM
User.where("name = '#{params[:name]}'")
// VULNERABLE - Direct user input in commands
exec(`ls ${userInput}`);
system("ping " + ipAddress);
child_process.exec(`convert ${filename} output.png`);
// VULNERABLE - eval with user data
eval(userCode);
new Function(userInput)();
// SAFE - Node.js with parameterized query
const result = await db.query(
'SELECT * FROM users WHERE id = $1 AND status = $2',
[userId, status]
);
// SAFE - Using ORM properly
const user = await User.findOne({ where: { id: userId } });
// SAFE - Prepared statements
const stmt = db.prepare('SELECT * FROM users WHERE email = ?');
const user = stmt.get(email);
# SAFE - Python with parameterized query
cursor.execute(
"SELECT * FROM users WHERE id = %s AND status = %s",
(user_id, status)
)
# SAFE - SQLAlchemy ORM
user = session.query(User).filter(User.id == user_id).first()
// SAFE - PHP PDO with prepared statements
$stmt = $pdo->prepare('SELECT * FROM users WHERE id = :id');
$stmt->execute(['id' => $userId]);
// VULNERABLE - MongoDB with user object
db.users.find({ username: req.body.username, password: req.body.password });
// Attack: { "username": "admin", "password": { "$ne": "" } }
// SAFE - Validate and sanitize input
const username = String(req.body.username).slice(0, 50);
const password = String(req.body.password);
// SAFE - Use mongoose with schema validation
const userSchema = new Schema({
username: { type: String, required: true, maxlength: 50 },
password: { type: String, required: true }
});
// VULNERABLE
exec(`convert ${filename} output.png`);
// SAFE - Use array arguments (no shell)
execFile('convert', [filename, 'output.png']);
// SAFE - Whitelist allowed values
const ALLOWED_FORMATS = ['png', 'jpg', 'gif'];
if (!ALLOWED_FORMATS.includes(format)) {
throw new Error('Invalid format');
}
// SAFE - Use library instead of shell
const sharp = require('sharp');
await sharp(inputFile).toFile(outputFile);
# VULNERABLE
os.system(f"ping {ip_address}")
# SAFE - Use subprocess with list arguments
import subprocess
subprocess.run(['ping', '-c', '4', ip_address], check=True)
# SAFE - Use library instead of shell
import socket
socket.gethostbyname(hostname)
// Validation helper
function validateInput(input, options = {}) {
const { maxLength = 255, pattern, allowedValues } = options;
// Type check
if (typeof input !== 'string') {
throw new ValidationError('Input must be a string');
}
// Length check
if (input.length > maxLength) {
throw new ValidationError(`Input exceeds ${maxLength} characters`);
}
// Pattern check
if (pattern && !pattern.test(input)) {
throw new ValidationError('Input contains invalid characters');
}
// Whitelist check
if (allowedValues && !allowedValues.includes(input)) {
throw new ValidationError('Input value not allowed');
}
return input;
}
// Usage
const userId = validateInput(req.params.id, {
maxLength: 36,
pattern: /^[a-f0-9-]+$/i // UUID pattern
});
# SQL Injection tests
' OR '1'='1
'; DROP TABLE users; --
' UNION SELECT * FROM passwords --
1; SELECT * FROM users
# NoSQL Injection tests
{"$gt": ""}
{"$ne": null}
{"$where": "sleep(5000)"}
# Command Injection tests
; ls -la
| cat /etc/passwd
`whoami`
$(id)
# SQLMap for SQL injection
sqlmap -u "http://target.com/page?id=1" --dbs
# NoSQLMap for NoSQL injection
nosqlmap -u "http://target.com/api/users"
# Commix for command injection
commix -u "http://target.com/ping?ip=127.0.0.1"
express-validator for input validationeval() or child_process.exec() with user inputsubprocess.run() with list argumentsSECURE_CONTENT_TYPE_NOSNIFFwhere("column = '#{value}'")Shellwords.escape() for shell argumentsescapeshellarg() for shell arguments