KWDB Text-to-SQL

ReviewAudited by ClawScan on May 13, 2026.

Overview

This skill is transparent about helping with KWDB SQL, but it can also execute broad database write commands, including destructive ones, through an MCP server.

Install only if you intend the agent to help inspect KWDB schemas and possibly execute SQL. Prefer a read-only KWDB/MCP connection for query generation, and use write access only when you can manually review the generated SQL and explicitly approve any data-changing command.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If connected to a privileged KWDB instance, a mistaken or overbroad generated SQL statement could change or delete database data.

Why it was flagged

The skill can route generated SQL into a write-capable MCP tool, including destructive or schema-changing commands, with no separate guardrails for DROP, DELETE, or ALTER beyond a generic execution confirmation.

Skill content
Write query: INSERT, UPDATE, DELETE, CREATE, DROP, ALTER → use `write-query`
Recommendation

Use a least-privilege or read-only MCP account when possible, review generated SQL carefully, and require a separate explicit confirmation for destructive write operations.

What this means

The agent may see database names, table names, and schemas that could reveal sensitive structure or business context.

Why it was flagged

The skill uses the MCP server's database authority to discover database and schema metadata. This is useful for SQL generation but relies on the privileges of the configured KWDB connection.

Skill content
Execute `SHOW DATABASES` to list all databases ... Execute `SHOW TABLES FROM {database_name}` ... Execute `SHOW CREATE TABLE {database_name}.{table_name}`
Recommendation

Connect it only to KWDB accounts and databases the agent is allowed to inspect, and avoid broad admin credentials for routine SQL generation.

What this means

Query results may include sensitive operational or business data that becomes visible in the chat context.

Why it was flagged

KWDB query results and metadata flow through an MCP server into the agent's response. This is purpose-aligned, but the artifacts do not define separate data-boundary or redaction rules.

Skill content
`read-query` ... Returns ... `rows`: [{"col1": "val1", "col2": "val2"}]
Recommendation

Limit queries to needed data, avoid selecting sensitive columns unless necessary, and configure the MCP server with appropriate access controls.