<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: 白海洋</title>
    <description>The latest articles on DEV Community by 白海洋 (@_706015150500ca0399b12).</description>
    <link>https://dev.to/_706015150500ca0399b12</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3949063%2F29e53d81-b66e-46cd-9c64-79259c314a2d.png</url>
      <title>DEV Community: 白海洋</title>
      <link>https://dev.to/_706015150500ca0399b12</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/_706015150500ca0399b12"/>
    <language>en</language>
    <item>
      <title>Prompt Engineering Cannot Truly Secure LLM-Generated SQL</title>
      <dc:creator>白海洋</dc:creator>
      <pubDate>Sun, 24 May 2026 13:53:01 +0000</pubDate>
      <link>https://dev.to/_706015150500ca0399b12/prompt-engineering-cannot-truly-secure-llm-generated-sql-11nb</link>
      <guid>https://dev.to/_706015150500ca0399b12/prompt-engineering-cannot-truly-secure-llm-generated-sql-11nb</guid>
      <description>&lt;p&gt;Recently, many teams are working on Text-to-SQL, ChatBI, or data analysis Agents. One underestimated issue is that SQL generated by LLMs should not directly enter production databases.&lt;br&gt;
This article discusses: addressing the common misconception that "prompt rules can control generated SQL," and explaining why pre-execution validation is still necessary.&lt;br&gt;
Key points:&lt;br&gt;
Prompts can guide the model, but cannot enforce database security.&lt;br&gt;
Generated SQL requires deterministic pre-execution validation.&lt;br&gt;
The correct pattern is prompt guidance + parser/catalog/policy/audit checks.&lt;br&gt;
Original link: &lt;a href="https://www.dpriver.com/blog/prompt-engineering-cannot-secure-llm-generated-sql/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_prompt_engineering_cannot_secure_llm_generated_sql" rel="noopener noreferrer"&gt;https://www.dpriver.com/blog/prompt-engineering-cannot-secure-llm-generated-sql/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_prompt_engineering_cannot_secure_llm_generated_sql&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>10 Security Risks of Text-to-SQL Before Going to Production</title>
      <dc:creator>白海洋</dc:creator>
      <pubDate>Sun, 24 May 2026 13:52:06 +0000</pubDate>
      <link>https://dev.to/_706015150500ca0399b12/10-security-risks-of-text-to-sql-before-going-to-production-2i2n</link>
      <guid>https://dev.to/_706015150500ca0399b12/10-security-risks-of-text-to-sql-before-going-to-production-2i2n</guid>
      <description>&lt;p&gt;Recently, many teams are working on Text-to-SQL, ChatBI, or data analysis Agents. One underestimated issue is that SQL generated by LLMs should not directly enter production databases.&lt;br&gt;
This article discusses: for teams currently launching Text-to-SQL, ChatBI, or database Agents, here are 10 categories of risks that must be checked before going live.&lt;br&gt;
Key points:&lt;br&gt;
Text-to-SQL security is not just about SQL injection.&lt;br&gt;
It also requires checking permissions, sensitive fields, high-cost queries, semantic errors, and auditing.&lt;br&gt;
This article serves as a pre-launch readiness checklist.&lt;br&gt;
Original link: &lt;a href="https://www.dpriver.com/blog/text-to-sql-security-10-risks-before-production-deployment/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_text_to_sql_security_10_risks_before_production_deployment" rel="noopener noreferrer"&gt;https://www.dpriver.com/blog/text-to-sql-security-10-risks-before-production-deployment/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_text_to_sql_security_10_risks_before_production_deployment&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Why Enterprises Should Not Let LLMs Execute SQL Directly?</title>
      <dc:creator>白海洋</dc:creator>
      <pubDate>Sun, 24 May 2026 13:04:56 +0000</pubDate>
      <link>https://dev.to/_706015150500ca0399b12/why-enterprises-should-not-let-llms-execute-sql-directly-56nk</link>
      <guid>https://dev.to/_706015150500ca0399b12/why-enterprises-should-not-let-llms-execute-sql-directly-56nk</guid>
      <description>&lt;p&gt;Recently, many teams are working on Text-to-SQL, ChatBI, or data analysis Agents. One underestimated issue is that SQL generated by LLMs should not directly enter production databases.&lt;br&gt;
This article discusses: a risk explanation for managers and architecture leaders: there must be a validation layer between LLMs and production databases.&lt;br&gt;
Key points:&lt;br&gt;
Allowing LLMs to execute SQL directly brings security, permission, cost, and audit risks.&lt;br&gt;
Prompts are not enforcement mechanisms.&lt;br&gt;
A deterministic SQL validation layer can transform generative SQL into a controllable process.&lt;br&gt;
Original link: &lt;a href="https://www.dpriver.com/blog/why-enterprises-should-not-let-llms-execute-sql-directly/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_why_enterprises_should_not_let_llms_execute_sql_directly" rel="noopener noreferrer"&gt;https://www.dpriver.com/blog/why-enterprises-should-not-let-llms-execute-sql-directly/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_why_enterprises_should_not_let_llms_execute_sql_directly&lt;/a&gt;&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>llm</category>
      <category>security</category>
      <category>sql</category>
    </item>
    <item>
      <title>What is an LLM SQL Guard?</title>
      <dc:creator>白海洋</dc:creator>
      <pubDate>Sun, 24 May 2026 13:02:23 +0000</pubDate>
      <link>https://dev.to/_706015150500ca0399b12/what-is-an-llm-sql-guard-20ei</link>
      <guid>https://dev.to/_706015150500ca0399b12/what-is-an-llm-sql-guard-20ei</guid>
      <description>&lt;p&gt;Recently, many teams are working on Text-to-SQL, ChatBI, or data analysis Agents. One underestimated issue is that SQL generated by LLMs should not directly enter production databases.&lt;br&gt;
This article discusses: explaining LLM SQL Guard with clear definitions: why Text-to-SQL cannot rely solely on model generation, and why deterministic SQL checks are mandatory before execution.&lt;br&gt;
Key points:&lt;br&gt;
LLM-generated SQL may be syntactically correct but semantically incorrect or unsafe.&lt;br&gt;
SQL Guard performs deterministic checks before execution by combining parser, catalog, policy, risk, and audit.&lt;br&gt;
Suitable as an introductory article for AI data governance, ChatBI, and Text-to-SQL teams.&lt;br&gt;
Original link: &lt;a href="https://www.dpriver.com/blog/what-is-an-llm-sql-guard/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_what_is_an_llm_sql_guard" rel="noopener noreferrer"&gt;https://www.dpriver.com/blog/what-is-an-llm-sql-guard/?utm_source=dev&amp;amp;utm_medium=community&amp;amp;utm_campaign=ai_sql_governance_external_2026q2&amp;amp;utm_content=shenhuan_dev_what_is_an_llm_sql_guard&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
