SWE-0001 ℵ₀

Missing Indexes on Frequently Queried Columns

Failing to create indexes on columns used in WHERE clauses, JOIN conditions, or ORDER BY statements, causing full table scans that degrade exponential...

SWE-0002 ℵ₀

Insufficient Integer Size for Growth

Using 32-bit integers for auto-incrementing primary keys or counters that will exceed 2.14 billion, causing complete write failures when the limit is ...

SWE-0003 ℵ₁

Lack of Foreign Keys / Constraints

Not enforcing relational integrity at the schema level through foreign key constraints, unique constraints, or CHECK constraints. The database becomes...

SWE-1001 ℵ₁

Over-Normalized Schema with Excessive Joins

Taking database normalization to an extreme where data is split into too many tables, requiring numerous joins for basic operations. While normalizati...

SWE-1002 ℵ₁

Under-Normalization (God Tables)

Creating "God tables" with dozens or hundreds of columns that mix multiple entity types or business concepts. Includes anti-patterns like repeated col...

SWE-1003 ℵ₁

Cache-Unfriendly Schema Design

Schema designs that prevent effective caching strategies, causing database overload under normal operating conditions. This includes mixing frequently...

SWE-2001 ℵ₀

Non-Atomic Schema Migrations

Deploying schema changes and application code simultaneously without backward compatibility, creating windows where the system is in an inconsistent s...

SWE-2002 ℵ₁

Replication-Unsafe Schema Design

Schema designs that don't account for distributed database replication challenges, leading to split-brain scenarios, replication lag issues, or confli...

SWE-3001 2^ℵ₀

Unbounded Social Graph Queries

Implementing social relationships using pure relational joins without considering the exponential growth of multi-hop queries. Simple adjacency list t...

SWE-3002 ℵ₀

JSON Blob Misuse in Relational Database

Storing significant structured data as JSON blobs inside relational database tables instead of using proper columns and relationships. While modern da...

SWE-3003 2^ℵ₀

Insufficient Permission Granularity in Schema

Schema designs that lack proper permission granularity, allowing broad access to data through single permission grants. This includes friend-of-friend...

SWE-3004 ℵ₁

Security Audit Trail Schema Weakness

Schemas that lack proper audit trail tables or security event logging structures, making it impossible to detect breaches, investigate incidents, or m...

SWE-3005 ℵ₀

Insufficient Security Isolation in Schema

Schema designs that fail to isolate high-value or sensitive data from less critical data, creating single points of failure where compromise of one co...

SWE-4001 ℵ₁

Poor Data Partitioning and Hotspot Keys

Designing schemas without considering data distribution, either keeping everything monolithic or choosing partition keys that create severe hotspots. ...

SWE-4002 ℵ₁

Unbounded Growth (No Data Archiving)

Allowing tables to grow indefinitely without archival or cleanup strategies. Common with logs, audit records, and historical data where the assumption...

SWE-4003 ℵ₁

Inflexible Schema Migration

Schema design and deployment processes that make database changes extremely difficult or require downtime. Includes lack of online DDL support, huge t...