database-management-patterns
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.80). The skill includes examples that embed plaintext passwords and connection strings with literal password fields (e.g., CREATE ROLE ... PASSWORD 'secure_password', primary_conninfo = '... password=...'), which encourages including secret values verbatim in commands/configs and poses exfiltration risk.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill includes explicit instructions and example commands that modify database server configuration files (postgresql.conf, pg_hba.conf), start/manage database processes (mongod, mongos, pg_ctl), and create replication roles—operations that change system/service state and typically require elevated privileges, so it could push an agent to modify the host machine.
Audit Metadata