$ man db-migration-risk
/db-migration-risk(1)
PRICE / CALL
$0.02
USDC · base mainnet · scheme: exact
──────────────────────────────────────────────────────────────────────────────
NAME
db-migration-risk — db migration risk audit / sql migration safety check / drop column detector / unsafe alter table detector / postgres create index concurr…
SYNOPSIS
POST https://x402.org/v1/db-migration-risk
Content-Type: application/json
X-PAYMENT: <signed-transferWithAuthorization>
{ ... }↳ first call → 402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.
DESCRIPTION
DB migration risk audit / SQL migration safety check / DROP COLUMN detector / unsafe ALTER TABLE detector / Postgres CREATE INDEX CONCURRENTLY check / Alembic op.drop_* detector / TRUNCATE/DELETE WHERE detector / foreign key NOT VALID check / pre-deploy DB gate. Walks `migrations/`, `prisma/migrations/`, `db/migrate/`, `supabase/migrations/`, `alembic/versions/` and flags destructive DDL, lock-heavy ALTER TABLE, NOT NULL without DEFAULT, plain CREATE INDEX (vs CONCURRENTLY), unbounded TRUNCATE/DELETE, and FK validation without NOT VALID. Returns 0-100 score, per-finding kind/severity/path/line/evidence/recommendation, and a Venice plain-English verdict. Dual input: {repo: 'owner/name'} for public GitHub or {files: [{path, content}, …]} for private / agent-workspace use.
OUTPUT — response shape
| field | type | description |
|---|
| score | number | Overall migration safety score from 0-100, with higher meaning safer (fewer destructive or lock-heavy operations found). |
| risk_level | string | Bucketed risk label like low/medium/high/critical derived from the score and worst-finding severity. |
| findings | array | Array of detected issues, each with kind, severity, file path, line number, evidence snippet, and recommendation. |
| signals | object | Counts of detected patterns by kind (drop_column, alter_table, create_index_blocking, fk_not_valid, truncate, etc.). |
| summary | string | Venice-generated plain-English verdict explaining the top risks and whether the migration set is safe to deploy. |
| metadata | object | Run metadata: files scanned, migration dirs found, repo or files mode, framework detected (alembic/prisma/etc), timing. |
EXAMPLES — two ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/db-migration-risk \
-H 'Content-Type: application/json' \
-d '{ }'first response = 402 Payment Required with payment requirements; sign + retry with X-PAYMENT.
EXAMPLE 2 · mcp
# install once
claude mcp add x402 --command "npx x402-deployer-mcp"
# then ask Claude Code:
# "use the db-migration-risk tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
- tags
- securitydatabasemigrationssqlalembicpostgresprooflayer
- env
- VENICE_API_KEY
- methods
- POST
- cluster
- prooflayer
- price
- $0.02 USDC per call
ADJACENT — other endpoints in prooflayer
| endpoint | description | price |
|---|
| deploy-config-risk | deploy config audit / Dockerfile lint / vercel.json hardening / wrangler.toml review / docker-compose.yml safety / fly.toml secrets check… | $0.02 |
| secrets-exposure-check | secrets exposure scan / hardcoded API key detector / .env-committed-key audit / Next.js client env leak detector / pre-deploy secret gate. | $0.02 |
| ai-content-detector | AI content detector / GPT detector / ChatGPT plagiarism checker. | $0.03 |
| dep-risk-summary | repo dependency risk audit / package.json + lockfile vetter / unpinned dep detector / transitive dep counter / requirements.txt audit / p… | $0.03 |
| github-repo-health | GitHub repo health score / open-source maintainability checker. | $0.03 |
| package-risk-npm | npm package risk score / supply-chain scanner / typosquat detector. | $0.03 |
| prompt-injection-surface | AI prompt injection surface scanner / LLM call-site audit / unsanitized user input in prompts detector / system-message mixing flag / unb… | $0.03 |
| pypi-package-risk | PyPI package risk score / Python supply-chain scanner. | $0.01 |