سجل التدقيق
webapp-sqlmap - 5 عمليات التدقيق
إصدار التدقيق 5
الأحدث مخاطر عاليةJan 16, 2026, 04:26 PM
This skill wraps sqlmap, a legitimate open-source penetration testing tool. Static findings (273 patterns) are TRUE POSITIVES for security-relevant operations but represent intentional functionality for authorized security testing. The skill includes explicit authorization requirements and ethical use guidelines. SQL injection testing can be destructive to databases and requires strict authorization controls.
عوامل الخطر
⚙️ الأوامر الخارجية (1)
🌐 الوصول إلى الشبكة (1)
📁 الوصول إلى نظام الملفات (1)
🔑 متغيرات البيئة (1)
إصدار التدقيق 4
مخاطر عاليةJan 16, 2026, 04:26 PM
This skill wraps sqlmap, a legitimate open-source penetration testing tool. Static findings (273 patterns) are TRUE POSITIVES for security-relevant operations but represent intentional functionality for authorized security testing. The skill includes explicit authorization requirements and ethical use guidelines. SQL injection testing can be destructive to databases and requires strict authorization controls.
عوامل الخطر
⚙️ الأوامر الخارجية (1)
🌐 الوصول إلى الشبكة (1)
📁 الوصول إلى نظام الملفات (1)
🔑 متغيرات البيئة (1)
إصدار التدقيق 3
آمنJan 10, 2026, 11:07 AM
Pure documentation skill containing no executable code. Provides SQLMap usage guidance, workflow checklists, and CI/CD security templates. All content focuses on authorized penetration testing with explicit authorization requirements. No scripts, network calls, file system access, or command execution capabilities present.
إصدار التدقيق 2
آمنJan 10, 2026, 11:07 AM
Pure documentation skill containing no executable code. Provides SQLMap usage guidance, workflow checklists, and CI/CD security templates. All content focuses on authorized penetration testing with explicit authorization requirements. No scripts, network calls, file system access, or command execution capabilities present.
إصدار التدقيق 1
آمنJan 10, 2026, 11:07 AM
Pure documentation skill containing no executable code. Provides SQLMap usage guidance, workflow checklists, and CI/CD security templates. All content focuses on authorized penetration testing with explicit authorization requirements. No scripts, network calls, file system access, or command execution capabilities present.