SWE-0003 ℵ₁

Lack of Foreign Keys / Constraints

Not enforcing relational integrity at the schema level through foreign key constraints, unique constraints, or CHECK constraints. The database becomes...

SWE-1001 ℵ₁

Over-Normalized Schema with Excessive Joins

Taking database normalization to an extreme where data is split into too many tables, requiring numerous joins for basic operations. While normalizati...

SWE-1002 ℵ₁

Under-Normalization (God Tables)

Creating "God tables" with dozens or hundreds of columns that mix multiple entity types or business concepts. Includes anti-patterns like repeated col...

SWE-1003 ℵ₁

Cache-Unfriendly Schema Design

Schema designs that prevent effective caching strategies, causing database overload under normal operating conditions. This includes mixing frequently...

SWE-2002 ℵ₁

Replication-Unsafe Schema Design

Schema designs that don't account for distributed database replication challenges, leading to split-brain scenarios, replication lag issues, or confli...

SWE-3004 ℵ₁

Security Audit Trail Schema Weakness

Schemas that lack proper audit trail tables or security event logging structures, making it impossible to detect breaches, investigate incidents, or m...

SWE-4001 ℵ₁

Poor Data Partitioning and Hotspot Keys

Designing schemas without considering data distribution, either keeping everything monolithic or choosing partition keys that create severe hotspots. ...

SWE-4002 ℵ₁

Unbounded Growth (No Data Archiving)

Allowing tables to grow indefinitely without archival or cleanup strategies. Common with logs, audit records, and historical data where the assumption...

SWE-4003 ℵ₁

Inflexible Schema Migration

Schema design and deployment processes that make database changes extremely difficult or require downtime. Includes lack of online DDL support, huge t...

SWE-5002 ℵ₁

Cloud IAM Permission Overreach

Cloud IAM roles and policies configured with excessive permissions, violating the principle of least privilege. This includes EC2 instances with broad...

SWE-5003 ℵ₁

Healthcare Data Pipeline Resilience Weakness

Healthcare data processing systems designed without resilience mechanisms like circuit breakers, backpressure handling, or graceful degradation. These...

SWE-5004 ℵ₁

Third-Party Integration Security Weakness

Security vulnerabilities introduced through third-party integrations, including excessive permissions granted to vendors, lack of activity monitoring,...

SWE-5005 ℵ₁

Migration Backup and Recovery Weakness

Migration processes executed without verified backup and recovery capabilities. This includes untested backups, missing recovery procedures, lack of b...

SWE-6003 ℵ₁

Distributed Consensus Schema Weakness

Failures in distributed systems where different nodes operate with incompatible schemas, consensus rules, or protocol versions. This includes blockcha...

SWE-6004 ℵ₁

Monolithic Database Architecture

Architectural pattern where diverse functionalities share a single database cluster, creating resource contention, scaling limitations, and blast radi...

SWE-6005 ℵ₁

Configuration Schema Migration Weakness

Migration processes that leave configuration systems in inconsistent states, particularly when migrating between configuration management systems. Thi...