The list of all the queries

Database can be accessed through PUBLIC privileges

Query goal: Find as to whether the database access by users (applications) can take place thanks to PUBLIC privileges, i.e., find as to whether PUBLIC (all current and future users) has CONNECT privilege in the database. PUBLIC gets the privilege by default.
Query type: Problem detection (Each row in the result could represent a flaw in the design)
Query reliability: High (Few or no false-positive results)
Query license: MIT License
Fixing suggestion: Revoke the privileges from PUBLIC. Grant connect privilege to the users that correspond to applications.
Data source: system catalog only
SQL query: Click on query to copy it

WITH db_privs AS (SELECT unnest(datacl)::text AS priv  
FROM pg_database
WHERE datname=current_database())
SELECT 'Database can be connected thanks to the connection privilege to PUBLIC' AS mistake
WHERE NOT EXISTS (SELECT *
FROM db_privs)
OR EXISTS (SELECT *
FROM db_privs
WHERE priv~'^=[[:alpha:]]*c');

SQL statements for generating SQL statements that help us to fix the problem

SQL queryDescription
WITH db_privs AS (SELECT unnest(datacl)::text AS priv  
FROM pg_database
WHERE datname=current_database())
SELECT format('REVOKE CONNECT, TEMP ON DATABASE %1$I FROM PUBLIC;', current_database()) AS statements
WHERE NOT EXISTS (SELECT *
FROM db_privs)
OR EXISTS (SELECT *
FROM db_privs
WHERE priv~'^=[[:alpha:]]*c');
Revoke the CONNECT and TEMPORARY privileges from PUBLIC.

Collections where the query belongs to

Collection nameCollection description
Find problems automaticallyQueries, that results point to problems in the database. Each query in the collection produces an initial assessment. However, a human reviewer has the final say as to whether there is a problem or not .

Categories where the query belongs to

Category nameCategory description
SecurityQueries of this category provide information about the security measures.

The list of all the queries