Database Manager

Plan, operate, and recover relational databases with schema governance, safe migrations, backup drills, and incident response playbooks.

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 646 · 8 current installs · 8 all-time installs
byIván@ivangdavila
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (database operations, migrations, backups, incident playbooks) aligns with the files and runtime instructions. The only requested resource is a local config/memory path (~/database-manager/), which is appropriate for durable runbooks and checklists.
Instruction Scope
All runtime instructions are documentation-centric and scoped to local files: templates, checklists, and a setup flow that (with user consent) creates ~/database-manager/ and initializes files with restrictive permissions. One ambiguous clause: the skill may 'proceed with labeled assumptions' if context is missing — this grants the agent discretion to act on inferred context unless the agent explicitly asks the user, so the user should ensure the agent asks for confirmation before making environment-specific changes.
Install Mechanism
Instruction-only skill with no install spec and no code files. No packages, downloads, or executable installs are performed by the skill itself.
Credentials
The skill requests no environment variables, no credentials, and only a config path under the user's home. Files are expected to be plain text and the documentation explicitly says not to store secrets in memory files.
Persistence & Privilege
The skill persists durable state only under ~/database-manager/, a path declared in metadata and the setup docs. It is not always-enabled and does not request system-wide or other skills' config changes. The skill allows autonomous invocation by default (platform default) but that is not combined with elevated privileges or broad credential access.
Assessment
This skill appears coherent and limited to local runbooks. Before enabling: confirm you are comfortable with the agent creating ~/database-manager/ (it will create files and set restrictive permissions if you approve); do not store DB connection strings, passwords, or private keys in these files; ensure the agent asks for explicit confirmation before executing any steps that would connect to or modify production databases (the docs require user confirmation for destructive operations); and be cautious if you install the related runtime skills (sql, mysql, prisma) — those may request credentials or binaries to actually connect to databases. If you want higher assurance, validate the skill's homepage/owner or run it in a sandboxed account/home directory first.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk977qy4qb6vbwbfbg5est5axax8253cx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🗄️ Clawdis
OSLinux · macOS · Windows
Config~/database-manager/

SKILL.md

Setup

On first use, read setup.md for local initialization, activation preferences, and operating defaults.

When to Use

User needs a reliable database operating system for schema design, query hygiene, migration rollout, and recovery readiness. Agent keeps data work safe by enforcing preflight checks, explicit rollback plans, and incident-ready runbooks.

Use this skill when database changes can affect production reliability, latency, or data integrity.

Architecture

Memory lives in ~/database-manager/. See memory-template.md for the base structure.

~/database-manager/
├── memory.md                  # Durable context and operating preferences
├── inventory.md               # Systems, engines, owners, and critical datasets
├── standards.md               # Naming, indexing, and schema conventions
├── migrations.md              # Planned and executed migration records
├── backups.md                 # Backup schedule, retention, and restore drills
├── incidents.md               # Incident timeline, mitigations, and follow-up
└── archive/
    ├── migrations-YYYY-MM.md  # Closed migrations by month
    └── incidents-YYYY-MM.md   # Closed incidents by month

Quick Reference

TopicFile
Setup flowsetup.md
Memory templatememory-template.md
Inventory and ownership modelinventory-and-governance.md
Query operations and change windowsquery-operations.md
Migration and release controlsmigration-and-release.md
Backup and recovery workflowsbackup-and-recovery.md
Incident response sequenceincident-playbook.md
Reusable templatestemplates.md

Core Rules

1. Never Change Production Without a Preflight Packet

Every schema or data change must include:

  • intent
  • blast radius
  • rollback path
  • verification query set

Skipping preflight creates unbounded operational risk.

2. Separate Read Validation from Write Execution

Validate assumptions with read-only checks first, then run writes in explicit, audited steps.

This prevents accidental broad updates caused by stale predicates or wrong join keys.

3. Treat Migrations as Product Releases

Each migration requires:

  • owner
  • deployment window
  • rollback deadline
  • post-deploy verification criteria

Schema changes without release discipline are a primary source of prolonged incidents.

4. Make Index and Query Trade-offs Explicit

When changing indexes or query plans, state expected impact on:

  • read latency
  • write throughput
  • storage growth

Invisible trade-offs create hidden cost and unpredictable performance regressions.

5. Backup Is Not Real Until Restore Is Proven

Do not trust backup status alone. Run restore drills, validate recovered row counts, and document measured recovery time.

Unverified backups are operationally equivalent to no backups.

6. Encode Safety Gates for Destructive Operations

Before DROP, TRUNCATE, broad DELETE, or bulk UPDATE:

  • confirm table and environment
  • capture row count baseline
  • require explicit user confirmation
  • log exact rollback route

Destructive steps without safety gates can permanently corrupt business data.

7. Close Every Incident with Durable Learning

After mitigation:

  • capture root cause
  • record missing guardrail
  • add one concrete prevention change

Without closure rules, the same incident class repeats.

Common Traps

  • Running updates without a restrictive predicate -> unintended mass writes and long rollback windows.
  • Shipping migrations without timing and lock analysis -> production latency spikes and blocked transactions.
  • Assuming replica lag is harmless -> stale reads and misleading verification outcomes.
  • Declaring backup success without restore drills -> false confidence during outages.
  • Fixing incidents without permanent guardrails -> repeated operational failures.

Security & Privacy

Data that leaves your machine:

  • None by default.

Data that stays local:

  • Database operating context and records under ~/database-manager/.

This skill does NOT:

  • Execute destructive commands without explicit user confirmation.
  • Access unrelated credentials or services by default.
  • Store secrets in memory files.

Related Skills

Install with clawhub install <slug> if user confirms:

  • sql - SQL query authoring and analysis
  • mysql - MySQL-specific workflows and troubleshooting
  • prisma - Prisma schema and migration tooling
  • sqlite - local database workflows and prototyping
  • backend - backend architecture and service delivery

Feedback

  • If useful: clawhub star database-manager
  • Stay updated: clawhub sync

Files

9 total
Select a file
Select a file to preview.

Comments

Loading comments…