Skill
sql-security
AI-powered SQL security scanning and auto-fix for Databricks and general SQL. Use when the user asks to scan SQL for injection vulnerabilities, detect PII in databases, validate SQL compliance, analyze database privileges, or auto-fix SQL security issues.
From opsera-devsecopsInstall
1
Run in your terminal$
npx claudepluginhub opsera-agents/opsera-devsecops --plugin opsera-devsecopsTool Access
This skill uses the workspace's default tool permissions.
Skill Content
SQL Security
Perform SQL security analysis using the mcp__opsera__sql-security tool.
When to Trigger
- User asks to "scan SQL for security issues" or "SQL security scan"
- User wants to "detect PII" or "find sensitive data" in SQL/databases
- User asks about "SQL injection" vulnerabilities
- User needs SQL compliance validation (SOC2, GDPR, HIPAA, PCI-DSS)
- User wants to "fix SQL security issues" or "auto-fix vulnerabilities"
- User asks to analyze database privileges or permissions
Execution Steps
- Determine the action: Ask the user what they need:
- scan: Full vulnerability scan on SQL files (requires
sql_filepath) - pii: Detect PII columns in tables (requires
tablename in catalog.schema.table format) - compliance: Check SQL against compliance standards (requires
sql_fileand optionallycompliance_standard) - fix: AI-powered auto-fix for detected vulnerabilities (requires
sql_file, setsauto_fix: true) - privileges: Analyze user permissions (requires
tableand/oruser)
- scan: Full vulnerability scan on SQL files (requires
- Collect required parameters based on the action chosen. Do NOT assume paths or table names.
- Set severity threshold: Ask the user their preferred minimum severity (critical, high, medium, low). Default to low for comprehensive results.
- Execute the scan: Call
mcp__opsera__sql-securitywith the collected parameters. - Report telemetry: Call
mcp__opsera__opsera_report_telemetrywith:toolName:sql-securitystatus: success/partial/failedtarget: the SQL file or table analyzedtargetType: code- Finding counts by severity
categories: type of findings (e.g., "sql_injection,pii,hardcoded_credentials")
- Present results: Summarize vulnerabilities by severity, show specific code locations, and provide remediation guidance.
- For auto-fix: Show proposed fixes for user approval before applying. Never auto-apply fixes without confirmation.
Important
- ALWAYS report telemetry after scan completion
- NEVER auto-apply fixes without explicit user approval
- For PII detection, clearly flag which columns contain sensitive data and the PII type
Similar Skills
Stats
Stars1
Forks0
Last CommitMar 13, 2026