> scanning-database-security
Process use when you need to work with security and compliance. This skill provides security scanning and vulnerability detection with comprehensive guidance and automation. Trigger with phrases like "scan for vulnerabilities", "implement security controls", or "audit security".
curl "https://skillshub.wtf/jeremylongshore/claude-code-plugins-plus-skills/scanning-database-security?format=md"Database Security Scanner
Overview
Audit database security configurations, user privileges, network exposure, and data protection controls for PostgreSQL, MySQL, and MongoDB. This skill scans for common vulnerabilities including excessive privileges, missing encryption, default passwords, exposed network ports, unpatched versions, and SQL injection vectors in application code.
Prerequisites
- Database admin credentials for querying system catalogs and security settings
psql,mysql, ormongoshCLI tools installed- Access to database configuration files (
postgresql.conf,pg_hba.conf,my.cnf,mongod.conf) - Application source code access for SQL injection scanning (using Grep/Glob tools)
- Knowledge of applicable compliance frameworks (SOC 2, HIPAA, PCI-DSS, GDPR)
Instructions
-
Check authentication configuration by reviewing
pg_hba.conf(PostgreSQL) ormysql.usertable. Flag any entries usingtrustauthentication, allowing connections without passwords. Verifypassword_encryption = scram-sha-256(notmd5) in PostgreSQL. -
Audit user privileges by querying role memberships and grants:
- PostgreSQL:
SELECT r.rolname, r.rolsuper, r.rolinherit, r.rolcreaterole, r.rolcreatedb FROM pg_roles r WHERE r.rolcanlogin = true - MySQL:
SELECT user, host, Super_priv, Grant_priv, File_priv FROM mysql.user - Flag users with superuser/SUPER privilege, excessive grants, or
GRANT OPTION
- PostgreSQL:
-
Scan for default or weak credentials. Check for accounts with no password: PostgreSQL
SELECT rolname FROM pg_roles WHERE rolpassword IS NULL AND rolcanlogin = true. Check for well-known default accounts (postgres with default password, root without password, admin/admin). -
Verify network security:
- Check
listen_addressesin postgresql.conf (should not be*in production without firewall) - Verify SSL/TLS is enforced:
SHOW sslshould returnon;pg_hba.confshould usehostsslinstead ofhost - Confirm database port is not exposed to the public internet
- Check
-
Check encryption at rest:
- Verify tablespace encryption or volume-level encryption is enabled
- Scan for sensitive data stored in plaintext:
SELECT column_name, data_type FROM information_schema.columns WHERE column_name ILIKE '%password%' OR column_name ILIKE '%ssn%' OR column_name ILIKE '%credit_card%' - Flag columns storing PII without encryption or hashing
-
Scan application source code for SQL injection vulnerabilities using Grep:
- Search for string concatenation in SQL queries: patterns like
"SELECT * FROM " + variableor Python f-strings with interpolated table names - Search for missing parameterized queries: raw SQL construction without bind parameters
- Flag ORM
raw()orexecute()calls with string interpolation
- Search for string concatenation in SQL queries: patterns like
-
Review database object permissions:
- Check for PUBLIC grants on sensitive tables:
SELECT grantee, table_name, privilege_type FROM information_schema.table_privileges WHERE grantee = 'PUBLIC' - Verify functions are created with
SECURITY DEFINERonly when necessary - Check for world-readable backup files on the filesystem
- Check for PUBLIC grants on sensitive tables:
-
Audit logging configuration:
- Verify
log_connections = on,log_disconnections = onin PostgreSQL - Check
log_statement = 'ddl'or'all'for sensitive databases - Confirm audit logs are shipped to a tamper-proof location
- Verify
-
Check for known CVEs by comparing the database version against the latest security advisories. Flag databases running versions with known critical vulnerabilities.
-
Generate a security findings report with severity levels (Critical, High, Medium, Low), affected components, evidence (query output showing the vulnerability), and specific remediation commands.
Output
- Security findings report with severity-ranked vulnerabilities and evidence
- Remediation scripts (SQL) for revoking excessive privileges, fixing authentication, enabling SSL
- Hardened configuration templates for postgresql.conf, pg_hba.conf, or my.cnf
- SQL injection findings listing vulnerable code locations with fix suggestions
- Compliance checklist mapping findings to SOC 2, HIPAA, or PCI-DSS controls
Error Handling
| Error | Cause | Solution |
|---|---|---|
| Permission denied querying pg_roles or mysql.user | Scanner account lacks privilege to read user metadata | Grant pg_read_all_settings and pg_read_all_stats roles; or run scan with superuser credentials in a controlled session |
| Cannot access postgresql.conf from SQL | File-system access restricted; pg_file_settings view not available | Use SHOW ALL to check runtime settings; request file access from ops team; use pg_settings catalog view |
| SSL certificate errors during scan | Self-signed certificates or expired certificates on database | Note as a finding; generate new certificates with openssl; configure ssl_cert_file and ssl_key_file |
| Source code scan produces false positives | Dynamic SQL construction that uses proper parameterization | Review flagged locations manually; whitelist confirmed-safe patterns; focus on string concatenation with user input |
| Database version check shows EOL version | Database version no longer receiving security patches | Prioritize as critical finding; plan upgrade path; apply last available patches as interim measure |
Examples
PostgreSQL security audit revealing over-privileged roles: Scan discovers 5 application users with SUPERUSER privilege, pg_hba.conf using trust for local connections, and SSL disabled. Remediation: revoke SUPERUSER, create application-specific roles with minimum privileges, switch to scram-sha-256 authentication, and enable SSL with Let's Encrypt certificates.
SQL injection scan of a Node.js application: Grep finds 12 instances of db.query("SELECT * FROM users WHERE id = " + req.params.id) across 4 files. Remediation: replace with parameterized queries db.query("SELECT * FROM users WHERE id = $1", [req.params.id]). Each finding includes file path, line number, and corrected code.
PCI-DSS compliance check for payment database: Scan verifies: credit card numbers stored as hashed values (pass), audit logging enabled for cardholder data tables (pass), database admin accounts shared among team members (fail - individual accounts required), backups unencrypted on S3 (fail - enable SSE-S3). Produces compliance gap report with remediation timeline.
Resources
- CIS PostgreSQL Benchmark: https://www.cisecurity.org/benchmark/postgresql
- CIS MySQL Benchmark: https://www.cisecurity.org/benchmark/oracle_mysql
- PostgreSQL security documentation: https://www.postgresql.org/docs/current/auth-pg-hba-conf.html
- OWASP SQL Injection Prevention: https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html
- Database security checklist: https://www.postgresql.org/docs/current/auth-methods.html
> related_skills --same-repo
> fathom-cost-tuning
Optimize Fathom API usage and plan selection. Trigger with phrases like "fathom cost", "fathom pricing", "fathom plan".
> fathom-core-workflow-b
Sync Fathom meeting data to CRM and build automated follow-up workflows. Use when integrating Fathom with Salesforce, HubSpot, or custom CRMs, or creating automated post-meeting email summaries. Trigger with phrases like "fathom crm sync", "fathom salesforce", "fathom follow-up", "fathom post-meeting workflow".
> fathom-core-workflow-a
Build a meeting analytics pipeline with Fathom transcripts and summaries. Use when extracting insights from meetings, building CRM sync, or creating automated meeting follow-up workflows. Trigger with phrases like "fathom analytics", "fathom meeting pipeline", "fathom transcript analysis", "fathom action items sync".
> fathom-common-errors
Diagnose and fix Fathom API errors including auth failures and missing data. Use when API calls fail, transcripts are empty, or webhooks are not firing. Trigger with phrases like "fathom error", "fathom not working", "fathom api failure", "fix fathom".