This skill helps implement database audit logging for tracking changes and ensuring compliance. It is triggered when the user requests to "implement database audit logging", "add audit trails", "track database changes", or mentions "audit_log" in relation to a database. The skill provides options for trigger-based auditing, application-level logging, Change Data Capture (CDC), and parsing database logs. It generates a basic audit table schema and guides the user through selecting the appropriate auditing strategy.
Install with Tessl CLI
npx tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill implementing-database-audit-logging91
Quality
53%
Does it follow best practices?
Impact
98%
1.03xAverage score across 9 eval scenarios
Optimize this skill with Tessl
npx tessl skill review --optimize ./backups/skills-migration-20251108-070147/plugins/database/database-audit-logger/skills/database-audit-logger/SKILL.mdAudit strategy selection and schema generation
Strategy options presented
100%
100%
All four strategies named
50%
100%
Audit table schema provided
100%
100%
Schema captures change metadata
100%
100%
Schema tailored to source tables
100%
100%
Performance trade-off discussed
100%
100%
CDC infrastructure note
100%
100%
Strategy recommendation given
100%
100%
Implementation notes file
100%
100%
Without context: $0.4028 · 2m 4s · 20 turns · 21 in / 6,873 out tokens
With context: $0.5485 · 2m 19s · 28 turns · 27 in / 7,888 out tokens
Compliance-driven audit logging with retention policy
CDC recommended for compliance
0%
0%
Real-time rationale
0%
100%
Retention policy defined
100%
100%
Regulatory basis for retention
100%
100%
Data sensitivity section
100%
100%
Audit table schema provided
100%
100%
Schema references source tables
100%
100%
Access control mentioned
100%
100%
Encryption or separation mentioned
100%
100%
Security file exists
100%
100%
Without context: $0.4823 · 2m 34s · 21 turns · 21 in / 9,106 out tokens
With context: $0.5744 · 2m 34s · 26 turns · 139 in / 9,019 out tokens
Application-level logging with monitoring integration
Application-level strategy explained
100%
100%
Multiple strategies contrasted
100%
100%
Performance trade-off discussed
100%
100%
Audit table schema provided
100%
100%
Multi-service schema support
100%
100%
AuditLogger implementation
100%
100%
Application context captured
100%
100%
Monitoring integration document
100%
100%
Centralized view goal stated
100%
100%
Usage example provided
100%
100%
Without context: $0.5820 · 3m 9s · 24 turns · 25 in / 10,742 out tokens
With context: $0.6586 · 3m 12s · 28 turns · 292 in / 11,331 out tokens
Trigger-based auditing for data debugging
Trigger-based strategy chosen
100%
100%
Strategy comparison present
100%
100%
Audit table schema
100%
100%
Operation type captured
100%
100%
Old and new values captured
100%
100%
Timestamp column present
100%
100%
Database user recorded
100%
100%
Triggers on accounts table
100%
100%
Triggers on ledger_entries table
100%
100%
Performance impact documented
100%
100%
SQL is executable (no placeholders)
100%
100%
Without context: $0.3597 · 1m 51s · 18 turns · 19 in / 6,178 out tokens
With context: $0.4741 · 1m 59s · 26 turns · 59 in / 6,692 out tokens
Database log parsing for security monitoring
Database Logs strategy chosen
100%
100%
Strategy options compared
100%
100%
Log configuration parameters documented
100%
100%
Example config values provided
100%
100%
PII sensitivity addressed
100%
100%
Log access control mentioned
100%
100%
Security monitoring purpose addressed
100%
100%
Specific tables referenced
100%
100%
No-code-change constraint acknowledged
100%
100%
Without context: $0.2628 · 1m 54s · 13 turns · 14 in / 5,402 out tokens
With context: $0.6264 · 3m 9s · 29 turns · 29 in / 9,753 out tokens
Audit design with retention and monitoring integration
Retention duration specified
100%
100%
PCI-DSS cited for retention
100%
100%
Monitoring integration described
100%
100%
Centralized view goal stated
100%
100%
Strategy options compared
100%
100%
Strategy trade-offs discussed
100%
100%
Audit table schema provided
100%
100%
Schema captures key audit fields
100%
100%
Source tables referenced
100%
100%
Retention enforcement described
100%
100%
Without context: $0.4816 · 2m 58s · 12 turns · 13 in / 11,384 out tokens
With context: $0.5663 · 2m 42s · 23 turns · 22 in / 9,725 out tokens
Debugging-driven audit trail selection and schema
All four strategies named
100%
100%
Strategy recommended
100%
100%
Trigger performance warning
100%
100%
CDC complexity warning
100%
100%
Audit schema provided
100%
100%
Old value captured
100%
100%
New value captured
100%
100%
Timestamp captured
100%
100%
Database user captured
100%
100%
Schema references inventory
100%
100%
Without context: $0.2927 · 1m 29s · 16 turns · 17 in / 4,888 out tokens
With context: $0.3683 · 1m 29s · 20 turns · 20 in / 4,645 out tokens
Audit log data sensitivity and security measures
All four strategies named
62%
100%
Strategy recommended
100%
100%
Audit schema provided
100%
100%
Schema references compensation table
100%
100%
Access control addressed
100%
100%
Encryption or separation mentioned
100%
100%
Data sensitivity section
100%
100%
Retention policy defined
100%
100%
Trigger performance warning
50%
100%
CDC complexity warning
100%
100%
Operation type captured
100%
100%
Without context: $0.3434 · 1m 54s · 18 turns · 19 in / 5,778 out tokens
With context: $0.4178 · 2m 13s · 19 turns · 52 in / 7,232 out tokens
Cross-database audit strategy selection and comparison
All four strategies named
100%
100%
PostgreSQL recommendation
100%
100%
MySQL recommendation
100%
100%
Trigger performance warning
100%
100%
CDC complexity warning
100%
100%
Audit schema provided
100%
100%
Timestamp in schema
100%
100%
Operation type in schema
100%
100%
Strategies compared
100%
100%
Performance-based selection reasoning
100%
100%
Without context: $0.3785 · 2m 7s · 18 turns · 19 in / 6,783 out tokens
With context: $0.5070 · 2m 13s · 28 turns · 688 in / 7,020 out tokens
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.