Database Operations

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: database-operations Version: 1.0.0 The skill bundle provides comprehensive documentation and code examples for database operations, including schema design, query optimization, migrations, caching, and monitoring. All content, including SQL, C#, and TypeScript code snippets, aligns with the stated purpose of a database specialist skill. There are no instructions for the AI agent to perform malicious actions, exfiltrate data, or engage in prompt injection. Shell commands for `dotnet ef` and environment variable access (`process.env.REDIS_URL`) are presented as code examples for the agent to learn from, not as direct execution commands for the agent itself, consistent with an `output-format: code` skill.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied directly into an application, a generic soft-delete function could affect unintended tables or expose a broad data-mutation primitive.

Why it was flagged

The example defines a generic dynamic SQL function that updates whichever table name is supplied. Identifier quoting reduces injection risk, but the pattern is broad unless callers and allowed tables are constrained.

Skill content
CREATE OR REPLACE FUNCTION soft_delete(p_table TEXT, p_id BIGINT) ... EXECUTE format('UPDATE %I SET deleted_at = CURRENT_TIMESTAMP WHERE id = $1 AND deleted_at IS NULL', p_table)
Recommendation

Use an allow-list or per-table functions, restrict EXECUTE permissions, and require human review before applying database-changing SQL.

What this means

Audit logs could retain extra copies of sensitive user data if the pattern is applied without redaction or retention controls.

Why it was flagged

The audit trail pattern stores full before-and-after row values for the users table, whose example schema includes sensitive fields such as email and password_hash.

Skill content
CREATE TABLE audit_log (... old_values JSONB, new_values JSONB ...); ... AFTER INSERT OR UPDATE OR DELETE ON users ... to_jsonb(OLD) ... to_jsonb(NEW)
Recommendation

Exclude or redact sensitive fields from audit logs, limit who can read audit tables, and define retention policies before using this pattern.