2.1k★by lxgicstudios
sql-injection-scanner – OpenClaw Skill
sql-injection-scanner is an OpenClaw Skills integration for coding workflows. Detect SQL injection vulnerabilities in your codebase. Use when you need to find unsafe database queries before they get exploited.
Skill Snapshot
| name | sql-injection-scanner |
| description | Detect SQL injection vulnerabilities in your codebase. Use when you need to find unsafe database queries before they get exploited. OpenClaw Skills integration. |
| owner | lxgicstudios |
| repository | lxgicstudios/sql-injection-scanner |
| language | Markdown |
| license | MIT |
| topics | |
| security | L1 |
| install | openclaw add @lxgicstudios/sql-injection-scanner |
| last updated | Feb 7, 2026 |
Maintainer

name: sql-injection-scanner description: Detect SQL injection vulnerabilities in your codebase. Use when you need to find unsafe database queries before they get exploited.
SQL Injection Scanner
SQL injection has been around for decades and it's still in the OWASP Top 10. This tool scans your backend code for unsafe query construction, string concatenation in SQL, and missing parameterized queries. It finds the vulnerabilities and shows you how to fix them.
One command. Zero config. Just works.
Quick Start
npx ai-sql-check src/
What It Does
- Scans your codebase for SQL injection vulnerability patterns
- Detects string concatenation in SQL queries
- Finds missing parameterized query usage
- Identifies unsafe ORM patterns and raw query calls
- Generates fix suggestions showing proper parameterized versions
Usage Examples
# Scan your entire backend
npx ai-sql-check src/
# Check a specific API route
npx ai-sql-check src/routes/users.ts
# Scan all database related files
npx ai-sql-check "src/**/*.{ts,js}"
Best Practices
- Always use parameterized queries - String concatenation in SQL is never safe, even if you think the input is trusted
- Check ORM raw query calls - ORMs are generally safe, but raw query methods bypass protections
- Scan before every release - New code means new potential injection points
- Don't trust input validation alone - Parameterization is the real defense. Validation is just a bonus.
When to Use This
- Before a security audit or penetration test
- After adding new database queries to your backend
- When onboarding a legacy codebase with unknown security posture
- As part of your CI security pipeline
Part of the LXGIC Dev Toolkit
This is one of 110+ free developer tools built by LXGIC Studios. No paywalls, no sign-ups, no API keys on free tiers. Just tools that work.
Find more:
- GitHub: https://github.com/LXGIC-Studios
- Twitter: https://x.com/lxgicstudios
- Substack: https://lxgicstudios.substack.com
- Website: https://lxgic.dev
Requirements
No install needed. Just run with npx. Node.js 18+ recommended.
npx ai-sql-check --help
How It Works
The tool scans your source files for SQL query patterns and analyzes how user input flows into database calls. It uses pattern matching and AI analysis to detect string concatenation, template literals in queries, and unsafe ORM usage. Each finding includes severity, the vulnerable code, and a parameterized query fix.
License
MIT. Free forever. Use it however you want.
SQL Injection Scanner
Detect SQL injection vulnerabilities in your codebase.
Quick Start
npx ai-sql-check src/
What It Does
- Detects string concatenation in SQL queries
- Finds missing parameterized query usage
- Generates fix suggestions with proper parameterized versions
Part of the LXGIC Dev Toolkit
110+ free developer tools. No paywalls.
- GitHub: https://github.com/LXGIC-Studios
- Twitter: https://x.com/lxgicstudios
- Website: https://lxgic.dev
MIT License.
Permissions & Security
Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.
Requirements
No install needed. Just run with npx. Node.js 18+ recommended. ```bash npx ai-sql-check --help ```
FAQ
How do I install sql-injection-scanner?
Run openclaw add @lxgicstudios/sql-injection-scanner in your terminal. This installs sql-injection-scanner into your OpenClaw Skills catalog.
Does this skill run locally or in the cloud?
OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.
Where can I verify the source code?
The source repository is available at https://github.com/openclaw/skills/tree/main/skills/lxgicstudios/sql-injection-scanner. Review commits and README documentation before installing.
