SQL injection in user lookup endpoint
Returns the full user table including PII for any unauthenticated request.
api-gatewayAntigen deploys AI pen testing agents against your production systems every night and pairs them with a monthly human red team assessment. Every finding is delivered with traces, reproduction steps, and remediation - directly in Github, Linear, or the Antigen Platform.
Returns the full user table including PII for any unauthenticated request.
api-gateway200 OK · 312ms · 4,812 rows returned
[
{ "id": 1, "email": "ceo@acme-corp.com", "ssn": "***-**-1844" },
{ "id": 2, "email": "cfo@acme-corp.com", "ssn": "***-**-2901" },
{ "id": 3, "email": "vp.eng@acme-corp.com", "ssn": "***-**-3318" },
· 4,809 more records
]02:14.382 probe /api/v2/users/lookup 02:14.401 → candidate: SQL injection via id param 02:14.456 → payload: 1' OR '1'='1 02:14.694 ✓ 200 OK · 4,812 rows · exploit confirmed 02:14.701 filing finding F-01 · severity: critical 02:14.812 synced to github.com/acme-corp/api/issues/4421
Single Operator Uses AI to Breach Nine Mexican Government Agencies
CEOs Rank Cyber Risk as the #1 Threat in 2026
Frontier AI Can Autonomously Discover Zero-Day Vulnerabilities
An AI System Now Outperforms Every Human Hacker
Continuous Security Monitoring Is Now a Federal Baseline
Continuous offensive security that combines nightly AI pen testing, monthly expert validation, and engineering-ready remediation evidence.
See your entire infrastructure in a live, visual map - every service, endpoint, and dependency. Understand your full attack surface before an adversary does.
Reachable from internetinternet → api-gateway → users-db · 3 hops
A GitHub Action that runs static analysis on every pull request. Catch vulnerabilities before they reach production - directly in your workflow.
app.get('/api/v2/users/lookup', (req, res) => { const { id } = req.query; db.query(`SELECT * FROM users WHERE id=$\{id}`) .then(rows => res.json(rows));});Antigen SecuritySQL injection · CWE-89 · 1 critical finding
For software teams shipping fast, deploying agents, and exposing new services every week.
Continuous offensive testing for regulated environments where trust, auditability, and speed matter.
Independent validation for complex public-sector networks, vendors, and mission-critical systems.
Antigen conducts independent security research and responsibly discloses findings to affected organizations. We use that same adversarial discipline to protect customer environments every night.
Read our research