SQLite

v1.0.0

Use SQLite correctly with proper concurrency, pragmas, and type handling.

6· 4.8k·50 current·50 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description align with the requested binary (sqlite3) and the SKILL.md content. All required items (no credentials, no extra binaries) are proportionate to providing SQLite advice and usage patterns.
Instruction Scope
SKILL.md contains procedural guidance (PRAGMAs, transactions, backups, WAL handling) that stay within the scope of administering and using SQLite. It does not instruct reading unrelated system files or exfiltrating data. References to copying -wal/-shm files and using .backup are appropriate for the stated purpose.
Install Mechanism
No install spec or external downloads—this is instruction-only, which is low risk. The skill expects the sqlite3 CLI to already be present on the host.
Credentials
No environment variables, credentials, or config paths are requested. The lack of secrets is appropriate for a documentation/usage helper.
Persistence & Privilege
always is false and there is no indication the skill modifies other skills or system settings. It does not request persistent privileges beyond normal runtime invocation.
Assessment
This skill is an offline, instruction-only guide for SQLite and appears internally consistent. Before using it: ensure a trusted sqlite3 binary is installed on the machine; be aware that an agent following these instructions may run sqlite3 commands that read/modify local database files (so back up important DBs first); limit which database files the agent can access if you have sensitive data; note the skill's source/homepage are not provided (owner id only) — if you require a vendor-supported skill prefer one with clear provenance. If you are uncomfortable with an agent autonomously executing local sqlite3 commands, disable autonomous invocation or run commands manually using the guidance in the SKILL.md.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e6xjsdpv5nhznm74vk1bdkx80xs81

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🪶 Clawdis
OSLinux · macOS · Windows
Binssqlite3

Comments