SWE-0001 ℵ₀

Missing Indexes on Frequently Queried Columns

Failing to create indexes on columns used in WHERE clauses, JOIN conditions, or ORDER BY statements, causing full table scans that degrade exponential...

SWE-0002 ℵ₀

Insufficient Integer Size for Growth

Using 32-bit integers for auto-incrementing primary keys or counters that will exceed 2.14 billion, causing complete write failures when the limit is ...

SWE-0003 ℵ₁

Lack of Foreign Keys / Constraints

Not enforcing relational integrity at the schema level through foreign key constraints, unique constraints, or CHECK constraints. The database becomes...

SWE-1001 ℵ₁

Over-Normalized Schema with Excessive Joins

Taking database normalization to an extreme where data is split into too many tables, requiring numerous joins for basic operations. While normalizati...

SWE-1002 ℵ₁

Under-Normalization (God Tables)

Creating "God tables" with dozens or hundreds of columns that mix multiple entity types or business concepts. Includes anti-patterns like repeated col...

SWE-1003 ℵ₁

Cache-Unfriendly Schema Design

Schema designs that prevent effective caching strategies, causing database overload under normal operating conditions. This includes mixing frequently...

SWE-2001 ℵ₀

Non-Atomic Schema Migrations

Deploying schema changes and application code simultaneously without backward compatibility, creating windows where the system is in an inconsistent s...

SWE-2002 ℵ₁

Replication-Unsafe Schema Design

Schema designs that don't account for distributed database replication challenges, leading to split-brain scenarios, replication lag issues, or confli...

SWE-3001 2^ℵ₀

Unbounded Social Graph Queries

Implementing social relationships using pure relational joins without considering the exponential growth of multi-hop queries. Simple adjacency list t...

SWE-3002 ℵ₀

JSON Blob Misuse in Relational Database

Storing significant structured data as JSON blobs inside relational database tables instead of using proper columns and relationships. While modern da...

SWE-3003 2^ℵ₀

Insufficient Permission Granularity in Schema

Schema designs that lack proper permission granularity, allowing broad access to data through single permission grants. This includes friend-of-friend...

SWE-3004 ℵ₁

Security Audit Trail Schema Weakness

Schemas that lack proper audit trail tables or security event logging structures, making it impossible to detect breaches, investigate incidents, or m...

SWE-3005 ℵ₀

Insufficient Security Isolation in Schema

Schema designs that fail to isolate high-value or sensitive data from less critical data, creating single points of failure where compromise of one co...

SWE-4001 ℵ₁

Poor Data Partitioning and Hotspot Keys

Designing schemas without considering data distribution, either keeping everything monolithic or choosing partition keys that create severe hotspots. ...

SWE-4002 ℵ₁

Unbounded Growth (No Data Archiving)

Allowing tables to grow indefinitely without archival or cleanup strategies. Common with logs, audit records, and historical data where the assumption...

SWE-4003 ℵ₁

Inflexible Schema Migration

Schema design and deployment processes that make database changes extremely difficult or require downtime. Includes lack of online DDL support, huge t...

SWE-6003 ℵ₁

Distributed Consensus Schema Weakness

Failures in distributed systems where different nodes operate with incompatible schemas, consensus rules, or protocol versions. This includes blockcha...

SWE-5001 2^ℵ₀

API Rate Limiting and Enumeration Weakness

APIs that lack proper rate limiting, use predictable identifiers (sequential IDs), and don't verify authorization for each request. This allows attack...

SWE-5002 ℵ₁

Cloud IAM Permission Overreach

Cloud IAM roles and policies configured with excessive permissions, violating the principle of least privilege. This includes EC2 instances with broad...

SWE-5003 ℵ₁

Healthcare Data Pipeline Resilience Weakness

Healthcare data processing systems designed without resilience mechanisms like circuit breakers, backpressure handling, or graceful degradation. These...

SWE-5004 ℵ₁

Third-Party Integration Security Weakness

Security vulnerabilities introduced through third-party integrations, including excessive permissions granted to vendors, lack of activity monitoring,...

SWE-5005 ℵ₁

Migration Backup and Recovery Weakness

Migration processes executed without verified backup and recovery capabilities. This includes untested backups, missing recovery procedures, lack of b...

SWE-6005 ℵ₁

Configuration Schema Migration Weakness

Migration processes that leave configuration systems in inconsistent states, particularly when migrating between configuration management systems. Thi...

SWE-6001 2^ℵ₀

Spreadsheet-as-Database Anti-pattern

Using spreadsheet applications (Excel, Google Sheets, etc.) as production databases for critical data processing. This includes hitting row/column lim...

SWE-6002 2^ℵ₀

Legacy System Brittleness

Legacy systems (often decades old) that cannot adapt to modern demands, lacking elasticity, scalability, or ability to handle unexpected load patterns...

SWE-6004 ℵ₁

Monolithic Database Architecture

Architectural pattern where diverse functionalities share a single database cluster, creating resource contention, scaling limitations, and blast radi...