Database Schema Differ

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill appears purpose-aligned, but users should handle database credentials carefully, verify its live-database support, and review any generated migration SQL before use.

Before installing, confirm the tool supports your intended database workflow, use read-only credentials, avoid putting real passwords directly in command examples, review generated migrations before running them, and keep schema snapshots/output files private.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Database passwords or privileged accounts could be exposed through command history, process listings, or logs if pasted directly into commands.

Why it was flagged

The documented workflow uses database connection strings containing credentials, including comparisons across environments such as production. This is expected for schema comparison but gives the tool access to sensitive systems if real credentials are used.

Skill content
python3 scripts/main.py compare postgresql://user:pass@host1/db postgresql://user:pass@host2/db
Recommendation

Use read-only database accounts, avoid embedding passwords directly in command lines when possible, and prefer safer credential mechanisms supported by the database client.

What this means

If a generated migration is run blindly, it could delete tables, columns, or indexes in a database.

Why it was flagged

The skill generates migration scripts that may contain destructive DDL. The artifacts show generation of scripts, not automatic execution, so this is purpose-aligned but still needs human review.

Skill content
DROP TABLE IF EXISTS audit_logs; ... ALTER TABLE users DROP COLUMN IF EXISTS email_verified;
Recommendation

Review generated SQL manually, test it in a non-production environment, and keep backups before applying migrations.

What this means

Installing unverified packages or versions could introduce dependency risk.

Why it was flagged

The README asks users to install external Python packages, while the registry install spec is absent. These packages are normal for database tooling, but users should verify them because installation is manual.

Skill content
pip3 install sqlalchemy alembic psycopg2-binary pymysql
Recommendation

Install from trusted package sources, consider pinning versions, and use a virtual environment.

What this means

Saved schema files may expose table names, column names, relationships, or internal architecture if shared or committed accidentally.

Why it was flagged

The skill stores schema snapshots/history for later comparison. This persistence is central to the purpose, but schema metadata can still reveal sensitive business structure.

Skill content
Schema snapshots: Capture and store schema snapshots for historical comparison
Recommendation

Store snapshots securely, avoid committing sensitive schema exports to public repositories, and delete old snapshots when no longer needed.

What this means

Users may provide database URLs or expect live database functionality that the visible implementation may not actually support.

Why it was flagged

The visible code returns this error for non-SQL inputs, while the documentation advertises live database comparison via connection strings. This looks like an overstatement of capability rather than hidden malicious behavior.

Skill content
"error": "Database connections not implemented in this version"
Recommendation

Test with non-sensitive SQL files first and confirm live database support before providing production credentials.