Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why You Shouldn't Use LLMs to Generate SQL (Security Risks)

“Just let the LLM write the SQL.” It sounds powerful. A user types a question in plain English, the model generates a query, the system runs it against the database, and the answer comes back. No SQL knowledge required. No BI tools. No waiting for the data team. It works beautifully in demos. And it is a serious engineering mistake in production. Direct SQL generation from LLMs combines two things that should never be combined: untrusted code generation and privileged execution.

Stop Blaming AI for Bad System Design | Fix MCP Security

Every few weeks, a new story surfaces: an AI agent deletes a production database, an autonomous coding tool racks up a five-figure cloud bill, or a chatbot exfiltrates internal documents through a prompt injection attack. The reaction is predictable. “AI is dangerous.” “LLMs can’t be trusted.” “We need better guardrails on the model.” But if you look at the root cause of these incidents, the model is rarely the problem. The system around it is.

Why "Block All PII" Is the Wrong Answer: Handling Sensitive Data in MCP Systems

If your first instinct when connecting an LLM to enterprise systems via MCP is to strip out all personally identifiable information, you’re building a system that is useless. The “block all PII” approach sounds responsible. It checks a compliance box. But it fundamentally misunderstands what MCP-based AI systems do and why they need data in the first place. The real engineering challenge is not blocking data.