監査履歴
webapp-sqlmap - 5 監査
監査バージョン 5
最新 高リスクJan 16, 2026, 04:26 PM
This skill wraps sqlmap, a legitimate open-source penetration testing tool. Static findings (273 patterns) are TRUE POSITIVES for security-relevant operations but represent intentional functionality for authorized security testing. The skill includes explicit authorization requirements and ethical use guidelines. SQL injection testing can be destructive to databases and requires strict authorization controls.
リスク要因
⚙️ 外部コマンド (1)
🌐 ネットワークアクセス (1)
📁 ファイルシステムへのアクセス (1)
🔑 環境変数 (1)
監査バージョン 4
高リスクJan 16, 2026, 04:26 PM
This skill wraps sqlmap, a legitimate open-source penetration testing tool. Static findings (273 patterns) are TRUE POSITIVES for security-relevant operations but represent intentional functionality for authorized security testing. The skill includes explicit authorization requirements and ethical use guidelines. SQL injection testing can be destructive to databases and requires strict authorization controls.
リスク要因
⚙️ 外部コマンド (1)
🌐 ネットワークアクセス (1)
📁 ファイルシステムへのアクセス (1)
🔑 環境変数 (1)
監査バージョン 3
安全Jan 10, 2026, 11:07 AM
Pure documentation skill containing no executable code. Provides SQLMap usage guidance, workflow checklists, and CI/CD security templates. All content focuses on authorized penetration testing with explicit authorization requirements. No scripts, network calls, file system access, or command execution capabilities present.
監査バージョン 2
安全Jan 10, 2026, 11:07 AM
Pure documentation skill containing no executable code. Provides SQLMap usage guidance, workflow checklists, and CI/CD security templates. All content focuses on authorized penetration testing with explicit authorization requirements. No scripts, network calls, file system access, or command execution capabilities present.
監査バージョン 1
安全Jan 10, 2026, 11:07 AM
Pure documentation skill containing no executable code. Provides SQLMap usage guidance, workflow checklists, and CI/CD security templates. All content focuses on authorized penetration testing with explicit authorization requirements. No scripts, network calls, file system access, or command execution capabilities present.