Hologres Privileges

ReviewAudited by ClawScan on May 14, 2026.

Overview

This is a coherent Hologres permission-management reference, but it documents powerful database privilege changes that should be reviewed before running.

Install only if you need Hologres database privilege administration. Before running any generated SQL, verify the target database and account, review grants to PUBLIC or ALL TABLES carefully, and require explicit approval for SUPERUSER, DROP USER, ownership-transfer, and default-privilege changes.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or overbroad SQL command could grant, revoke, or alter database access.

Why it was flagged

The skill is intended to execute write-capable SQL through the Hologres CLI. This is purpose-aligned, but raw write SQL can materially change database access if the wrong target, schema, user, or command is used.

Skill content
All SQL execution depends on `hologres-cli` commands (`hologres sql run --write`).
Recommendation

Preview the exact SQL and confirm the Hologres instance, database, schema, role, and affected users before allowing execution.

What this means

If applied incorrectly, users could receive excessive privileges or lose access, and database ownership or administration boundaries could be changed.

Why it was flagged

The instructions include creating, promoting, demoting, and deleting database users, including superuser-level authority. These actions match the privilege-management purpose but are high-impact.

Skill content
CREATE USER "p4_1822780xxx" SUPERUSER; ... ALTER USER "p4_1822780xxx" SUPERUSER; ... DROP USER "p4_1822780xxx";
Recommendation

Use least-privilege role groups where possible, avoid SUPERUSER unless necessary, and require human confirmation for user deletion, ownership transfer, and superuser changes.

What this means

A default-privilege mistake could automatically expose future tables or functions to more users than intended.

Why it was flagged

Default privileges affect future database objects, and grants to PUBLIC can broaden access across many users. This is documented and purpose-aligned, but errors can propagate beyond the immediate command.

Skill content
ALTER DEFAULT PRIVILEGES FOR ROLE "user1" IN SCHEMA public
  GRANT SELECT ON TABLES TO PUBLIC;
Recommendation

Prefer scoped role groups over PUBLIC, document default-privilege rules, and audit them after team or schema changes.

What this means

The safety of database operations depends partly on installing the intended Hologres CLI package.

Why it was flagged

The skill instructs the user to install an external CLI package, but the provided install metadata does not declare an install spec or required binary. This appears to be a normal prerequisite for the skill, not hidden execution.

Skill content
pip install hologres-cli
Recommendation

Install the CLI from a trusted source, consider pinning a known-good version, and verify the CLI configuration before using it for write operations.