Claude-code-plugins-plus-skills scanning-database-security

install
source · Clone the upstream repo
git clone https://github.com/jeremylongshore/claude-code-plugins-plus-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/jeremylongshore/claude-code-plugins-plus-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/backups/skill-structure-cleanup-20251108-073936/plugins/database/database-security-scanner/skills/database-security-scanner" ~/.claude/skills/jeremylongshore-claude-code-plugins-plus-skills-scanning-database-security-ca57b4 && rm -rf "$T"
manifest: backups/skill-structure-cleanup-20251108-073936/plugins/database/database-security-scanner/skills/database-security-scanner/SKILL.md
source content

Overview

This skill empowers Claude to automatically assess the security of databases by utilizing the database-security-scanner plugin. It identifies vulnerabilities, provides OWASP compliance reports, and suggests remediation steps to improve the database's security posture.

How It Works

  1. Initiate Scan: The user's request triggers the database-security-scanner plugin.
  2. Vulnerability Assessment: The plugin scans the specified database for common vulnerabilities, including weak passwords, SQL injection risks, and insecure configurations.
  3. Report Generation: The plugin generates a detailed report outlining identified vulnerabilities and OWASP compliance status.
  4. Remediation Suggestions: The plugin provides actionable recommendations and, where possible, automated remediation scripts to address identified vulnerabilities.

When to Use This Skill

This skill activates when you need to:

  • Assess the security posture of a database.
  • Identify potential vulnerabilities in a database configuration.
  • Ensure a database complies with OWASP security guidelines.

Examples

Example 1: Assessing PostgreSQL Security

User request: "Scan the PostgreSQL database for security vulnerabilities and generate a report."

The skill will:

  1. Activate the database-security-scanner plugin.
  2. Scan the PostgreSQL database for vulnerabilities.
  3. Generate a report detailing the findings and remediation recommendations.

Example 2: Checking MySQL for OWASP Compliance

User request: "Perform an OWASP compliance check on the MySQL database."

The skill will:

  1. Activate the database-security-scanner plugin.
  2. Scan the MySQL database for OWASP compliance.
  3. Generate a report outlining any compliance violations and suggested fixes.

Best Practices

  • Database Access: Ensure Claude has the necessary credentials and permissions to access the database being scanned.
  • Regular Scans: Schedule regular security scans to continuously monitor the database for new vulnerabilities.
  • Remediation: Implement the suggested remediation steps to address identified vulnerabilities promptly.

Integration

This skill can be used in conjunction with other database management and security plugins to create a comprehensive database security workflow. For instance, it can be integrated with a plugin that automatically applies security patches based on the scanner's recommendations.