✓ Verified 🌐 Web Scrapers ✓ Enhanced Data

Db Readonly

Run safe read-only queries against MySQL or PostgreSQL for data inspection, reporting, and troublesh

Rating
4.3 (253 reviews)
Downloads
29,667 downloads
Version
1.0.0

Overview

Run safe read-only queries against MySQL or PostgreSQL for data inspection, reporting, and troubleshooting.

Complete Documentation

View Source →

db-readonly

Use this skill for database read tasks only.

What this skill does

  • Connect to PostgreSQL or MySQL using connection env vars
  • Execute SELECT / WITH / EXPLAIN queries only
  • Optionally save output to CSV/TSV/JSON
  • Block risky SQL (INSERT, UPDATE, DELETE, DROP, ALTER, etc.)

Connection env vars

PostgreSQL

  • PGHOST
  • PGPORT (optional, default 5432)
  • PGDATABASE
  • PGUSER
  • PGPASSWORD

MySQL

  • MYSQL_HOST
  • MYSQL_PORT (optional, default 3306)
  • MYSQL_DATABASE
  • MYSQL_USER
  • MYSQL_PASSWORD

Run

Use script:

  • scripts/db_readonly.sh postgres "SELECT now();"
  • scripts/db_readonly.sh mysql "SELECT NOW();"
Export example:
  • scripts/db_readonly.sh postgres "SELECT * FROM users LIMIT 100" --format csv --out /tmp/users.csv

Safety rules

  • Refuse non-read SQL.
  • Prefer LIMIT for exploratory queries.
  • When user asks for updates/deletes/schema changes, ask explicit confirmation and do not run via this skill.
  • Avoid printing secrets from env vars.

Reference

  • Query cookbook: references/query-cookbook.md

Installation

Terminal bash

openclaw install db-readonly
    
Copied!

Tags

#browser_and-automation #data

Quick Info

Category Web Scrapers
Model Claude 3.5
Complexity One-Click
Author ryanhong666
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
🧠

Ready to Install?

Get started with this skill in seconds

openclaw install db-readonly