pgvector

PassAudited by ClawScan on May 1, 2026.

Overview

This is a coherent pgvector reference skill, but users should verify the local database target and review any write/delete operations before using it.

This skill appears purpose-aligned and instruction-only. Before installing or using it, change the sample PostgreSQL connection to your own dedicated database/schema and least-privilege user, and approve any CREATE, UPDATE, INSERT, or DELETE operation against real data.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used carelessly, the agent could change or delete rows in a PostgreSQL database.

Why it was flagged

The skill documents SQL operations that can modify or delete database rows. These are expected for a database skill, but they should be applied only to the intended database and records.

Skill content
UPDATE documents
SET embedding = '[new_embedding]'
WHERE id = 1;
...
DELETE FROM documents WHERE id = 1;
Recommendation

Confirm the database, schema, table, and row targets before allowing write or delete operations; use backups and transactions for important data.

What this means

The agent may attempt database actions using a local account that could have broader access than intended.

Why it was flagged

The skill gives a specific local PostgreSQL user and empty password as the connection profile. This is coherent for a local example, but it relies on whatever privileges that database account has.

Skill content
psql -h localhost -p 5433 -U damien -d postgres
...
export PGUSER=damien
export PGPASSWORD=''
Recommendation

Use a dedicated least-privilege PostgreSQL user and a dedicated database or schema for vector/RAG data instead of a broad default account.

What this means

Private documents stored for retrieval may persist in the database and later be surfaced to the model as context.

Why it was flagged

The skill is designed to persist document chunks and retrieve them into LLM context. This is expected for RAG, but stored content can include sensitive or untrusted text.

Skill content
Store document chunks with embeddings
...
Retrieve relevant chunks for LLM context
SELECT chunk_text
FROM document_chunks
Recommendation

Avoid storing sensitive material unless needed, define retention rules, and treat retrieved chunks as untrusted context rather than authoritative instructions.