{"skill":{"slug":"report-sql","displayName":"Report Sql","summary":"Define and validate SQL template variables and blocks for report-service with zero tolerance, supporting safe injection, conditional fragments, loops, and da...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":105,"installsAllTime":1,"installsCurrent":1,"stars":0,"versions":1},"createdAt":1774330127417,"updatedAt":1774330143339},"latestVersion":{"version":"1.0.0","createdAt":1774330127417,"changelog":"- Initial release of the `report-sql` skill.\n- Defines a strict SQL variable templating protocol for `report-service`, supporting precise, safe, and namespaced variable injection.\n- Introduces block-level variable syntax (`${...}`) for conditional SQL fragments with \"empty-safe\" rendering.\n- Adds common SQL snippet patterns: fuzzy matching, date range queries, array variable loops (`$@... -> OR { ... }`), and complex EXISTS subqueries.\n- Details best practices to ensure SQL syntax integrity, including strict namespace and boundary rules for dynamic blocks.\n- Documents a structured JSON-based data transformation pipeline for SQL query results, supporting initialization, conditional assignment, object mapping, left joins, and complex response assembly.","license":"MIT-0"},"metadata":null,"owner":{"handle":"23396599","userId":"s17505rt29bfvda7ea1vychx6n83hp39","displayName":"23396599","image":"https://avatars.githubusercontent.com/u/126645196?v=4"},"moderation":{"isSuspicious":true,"isMalwareBlocked":false,"verdict":"suspicious","reasonCodes":["suspicious.llm_suspicious"],"summary":"Detected: suspicious.llm_suspicious","engineVersion":"v2.2.0","updatedAt":1774330143339}}