SQL Risk Mitigation
Reviews SQL queries generated by LLMs to block unauthorized actions, prevent data leaks, and maintain system performance. This category includes four key policies:- Allowed Tables Restricts SQL queries to a predefined list of tables, ensuring no unauthorized table access.
- Load Limit Prevents resource-intensive SQL queries, helping maintain system performance by blocking potentially overwhelming commands.
- Read-Only Access Ensures that only SELECT queries are permitted, blocking any attempts to modify the database with write operations.
- Restricted Tables Prevents access to sensitive data by blocking SQL queries targeting restricted tables.