Programmatic security management in Neo4j — RBAC/ABAC, user lifecycle (CREATE/ALTER/DROP USER), role lifecycle (CREATE/GRANT ROLE/DROP ROLE), privilege grants and denies (GRANT/DENY/REVOKE on graph, database, DBMS), property-level access control, sub-graph access control, SHOW PRIVILEGES inspection, and auth provider config reference (LDAP, OIDC/SSO). Use when an agent needs to manage users, roles, or privileges programmatically via Cypher on the system database. Does NOT handle Cypher query writing — use neo4j-cypher-skill. Does NOT handle cluster ops or backups — use neo4j-cli-tools-skill. Property-level security and ABAC require Enterprise Edition.
95
96%
Does it follow best practices?
Impact
91%
1.05xAverage score across 3 eval scenarios
Risky
Do not use without reviewing
Analytics role setup with property-level restrictions
IF NOT EXISTS on roles
100%
100%
ACCESS privilege granted
100%
100%
MATCH privilege for analysts
100%
100%
DENY on PII fields
100%
100%
DENY overrides GRANT approach
100%
100%
Write role privileges
100%
100%
Role assignment
100%
100%
Verification via SHOW ROLE PRIVILEGES AS COMMANDS
100%
100%
SHOW USER PRIVILEGES verification
62%
100%
System database context noted
0%
100%
No inline plaintext passwords
100%
100%
Design decision documented
100%
100%
Sub-graph access control with FOR pattern
FOR pattern used
100%
100%
GRANT TRAVERSE for navigation
100%
100%
FOR pattern read-only constraint noted
70%
30%
Write restriction prevents classification change
100%
100%
IF NOT EXISTS guards
100%
100%
ACCESS privilege on database
100%
100%
Cleared analyst full read
100%
100%
Performance overhead mentioned
80%
90%
Verification commands included
100%
100%
Privilege escalation limitation noted
100%
100%
User lifecycle management script
Parameterized passwords
0%
0%
CHANGE REQUIRED on new users
100%
100%
IF NOT EXISTS on CREATE USER
100%
100%
Bulk GRANT ROLE
0%
0%
Suspend instead of drop
100%
100%
IF EXISTS on ALTER USER
0%
100%
SHOW USERS audit query
100%
100%
SHOW USERS filtered
100%
100%
Plan documented before execution
100%
100%
System database context
100%
100%
engineer role setup
100%
100%
Impact annotations in plan
100%
100%
66ed0e1
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.