CtrlK
BlogDocsLog inGet started
Tessl Logo

managing-database-replication

Process use when you need to work with database scalability. This skill provides replication and sharding with comprehensive guidance and automation. Trigger with phrases like "set up replication", "implement sharding", or "scale database".

74

Quality

69%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Risky

Do not use without reviewing

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugins/database/database-replication-manager/skills/managing-database-replication/SKILL.md
SKILL.md
Quality
Evals
Security

Security

2 findings — 1 high severity, 1 medium severity. You should review these findings carefully before considering using this skill.

High

W007: Insecure credential handling detected in skill instructions

What this means

The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.

Why it was flagged

Insecure credential handling detected (high risk: 1.00). The prompt includes explicit commands that create users with plaintext passwords and replication commands that require SOURCE_PASSWORD/credentials to be embedded (even as placeholders), which forces the agent to output secret values verbatim in configuration/command artifacts.

Report incorrect finding
Medium

W013: Attempt to modify system services in skill instructions

What this means

The skill prompts the agent to compromise the security or integrity of the user’s machine by modifying system-level services or configurations, such as obtaining elevated privileges, altering startup scripts, or changing system-wide settings.

Why it was flagged

Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill instructs modifying database configuration files (pg_hba.conf, my.cnf), writing to system data directories (e.g. /var/lib/postgresql/data) and performing actions (base backups, replication setup, failover) that change the machine's state and often require elevated privileges, so it could compromise the host if executed by an agent.

Repository
jeremylongshore/claude-code-plugins-plus-skills
Audited
Security analysis
Snyk

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.