SQL Risk Mitigation

Reviews SQL queries generated by LLMs to block unauthorized actions, prevent data leaks, and maintain system performance.

This category includes four key policies:

  1. Allowed Tables Restricts SQL queries to a predefined list of tables, ensuring no unauthorized table access.

  2. Load Limit Prevents resource-intensive SQL queries, helping maintain system performance by blocking potentially overwhelming commands.

  3. Read-Only Access Ensures that only SELECT queries are permitted, blocking any attempts to modify the database with write operations.

  4. Restricted Tables Prevents access to sensitive data by blocking SQL queries targeting restricted tables.