skills$openclaw/sql-injection-scanner
lxgicstudios2.1k

by lxgicstudios

sql-injection-scanner – OpenClaw Skill

sql-injection-scanner is an OpenClaw Skills integration for coding workflows. Detect SQL injection vulnerabilities in your codebase. Use when you need to find unsafe database queries before they get exploited.

2.1k stars5.5k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026coding

Skill Snapshot

namesql-injection-scanner
descriptionDetect SQL injection vulnerabilities in your codebase. Use when you need to find unsafe database queries before they get exploited. OpenClaw Skills integration.
ownerlxgicstudios
repositorylxgicstudios/sql-injection-scanner
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @lxgicstudios/sql-injection-scanner
last updatedFeb 7, 2026

Maintainer

lxgicstudios

lxgicstudios

Maintains sql-injection-scanner in the OpenClaw Skills directory.

View GitHub profile
File Explorer
3 files
.
_meta.json
300 B
README.md
499 B
SKILL.md
2.5 KB
SKILL.md

name: sql-injection-scanner description: Detect SQL injection vulnerabilities in your codebase. Use when you need to find unsafe database queries before they get exploited.

SQL Injection Scanner

SQL injection has been around for decades and it's still in the OWASP Top 10. This tool scans your backend code for unsafe query construction, string concatenation in SQL, and missing parameterized queries. It finds the vulnerabilities and shows you how to fix them.

One command. Zero config. Just works.

Quick Start

npx ai-sql-check src/

What It Does

  • Scans your codebase for SQL injection vulnerability patterns
  • Detects string concatenation in SQL queries
  • Finds missing parameterized query usage
  • Identifies unsafe ORM patterns and raw query calls
  • Generates fix suggestions showing proper parameterized versions

Usage Examples

# Scan your entire backend
npx ai-sql-check src/

# Check a specific API route
npx ai-sql-check src/routes/users.ts

# Scan all database related files
npx ai-sql-check "src/**/*.{ts,js}"

Best Practices

  • Always use parameterized queries - String concatenation in SQL is never safe, even if you think the input is trusted
  • Check ORM raw query calls - ORMs are generally safe, but raw query methods bypass protections
  • Scan before every release - New code means new potential injection points
  • Don't trust input validation alone - Parameterization is the real defense. Validation is just a bonus.

When to Use This

  • Before a security audit or penetration test
  • After adding new database queries to your backend
  • When onboarding a legacy codebase with unknown security posture
  • As part of your CI security pipeline

Part of the LXGIC Dev Toolkit

This is one of 110+ free developer tools built by LXGIC Studios. No paywalls, no sign-ups, no API keys on free tiers. Just tools that work.

Find more:

Requirements

No install needed. Just run with npx. Node.js 18+ recommended.

npx ai-sql-check --help

How It Works

The tool scans your source files for SQL query patterns and analyzes how user input flows into database calls. It uses pattern matching and AI analysis to detect string concatenation, template literals in queries, and unsafe ORM usage. Each finding includes severity, the vulnerable code, and a parameterized query fix.

License

MIT. Free forever. Use it however you want.

README.md

SQL Injection Scanner

Detect SQL injection vulnerabilities in your codebase.

Quick Start

npx ai-sql-check src/

What It Does

  • Detects string concatenation in SQL queries
  • Finds missing parameterized query usage
  • Generates fix suggestions with proper parameterized versions

Part of the LXGIC Dev Toolkit

110+ free developer tools. No paywalls.

MIT License.

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

Requirements

No install needed. Just run with npx. Node.js 18+ recommended. ```bash npx ai-sql-check --help ```

FAQ

How do I install sql-injection-scanner?

Run openclaw add @lxgicstudios/sql-injection-scanner in your terminal. This installs sql-injection-scanner into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/lxgicstudios/sql-injection-scanner. Review commits and README documentation before installing.