Database Manager

ReviewAudited by ClawScan on May 10, 2026.

Overview

This database skill is purpose-aligned but broad: it asks for database credentials, can change or export data, and references a helper script that is not included for review.

Before installing or using this skill, verify the missing scripts/db.py code, run it only from a trusted path, and use least-privilege database credentials. Treat restore, migration, import, export, and arbitrary query actions as high-impact operations that should require explicit user approval and ideally be tested on a staging database first.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used against the wrong database or with overly privileged credentials, the agent could make lasting database changes or expose data through export/backup workflows.

Why it was flagged

These documented operations can overwrite data, change schemas, or bulk-import records, and the artifact does not specify approval, dry-run, rollback, or environment scoping before such actions.

Skill content
python3 scripts/db.py restore --input ./backup.sql; python3 scripts/db.py migrate --dir ./migrations/; python3 scripts/db.py import --table users --input ./users.csv
Recommendation

Require explicit user confirmation for restore, migrate, import, export, and non-read-only queries; use read-only credentials by default; test in staging; and back up before any write operation.

What this means

The command may fail or may run an unreviewed local scripts/db.py while database credentials are configured, creating path-confusion and provenance risk.

Why it was flagged

The reviewed artifact set contains only SKILL.md and no scripts/db.py helper, so following this relative command would depend on code that was not supplied or reviewed and could resolve to an unintended local file.

Skill content
python3 scripts/db.py query "SELECT * FROM users LIMIT 10"
Recommendation

Ship the referenced helper code in the skill, declare the Python/runtime requirements, use a skill-owned absolute path, and avoid executing relative helper scripts unless the user has reviewed them.

What this means

Database credentials may grant access to sensitive or production data if configured with broad privileges.

Why it was flagged

The skill expects database credentials or connection URIs, which is normal for this purpose, but the registry metadata declares no required environment variables or primary credential.

Skill content
export DB_USER="postgres"; export DB_PASS="password"; export DB_URI="mongodb://localhost:27017/mydb"
Recommendation

Use least-privilege database users, prefer read-only accounts for query/export tasks, separate admin credentials for migrations, and avoid production credentials unless the action is explicitly intended.