All Modules

SQL Receive

Secure Inbound Gateway

Secure inbound gateway for files, APIs, and emails. Malware scanning, data integrity checks, data leak prevention, and SQL injection detection before data enters your database.

Supported Input Sources

šŸ“

File Uploads

CSV, Excel, JSON, XML

šŸ”—

API Webhooks

REST endpoints

šŸ“„

Email Inbox

IMAP/POP3 polling

šŸ”’

SFTP/FTP

Secure file transfer

Security Pipeline

Every inbound item passes through multiple security checks before reaching your database

INBOUND SECURITY PIPELINE
═══════════════════════════════════════════════════════════════

   Incoming Data
        │
        ā–¼
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│  1. MALWARE SCAN                                          │
│  • ClamAV integration                                     │
│  • Virus signature detection                              │
│  • Macro/script detection in files                        │
│  • āœ“ Pass / āœ— Quarantine                                 │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
        │
        ā–¼
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│  2. DATA INTEGRITY CHECK                                  │
│  • File format validation                                 │
│  • Schema compliance                                      │
│  • Required field verification                            │
│  • Encoding detection (UTF-8, etc.)                       │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
        │
        ā–¼
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│  3. DATA LEAK DETECTION                                   │
│  • Presidio PII scanning                                  │
│  • Secret/credential detection                            │
│  • Policy violation alerts                                │
│  • Redaction or rejection                                 │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
        │
        ā–¼
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│  4. SQL INJECTION PREVENTION                              │
│  • Pattern matching for SQL commands                      │
│  • Comment injection detection                            │
│  • Union/batch attack prevention                          │
│  • Parameterized insert preparation                       │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
        │
        ā–¼
   āœ“ Safe to Insert

Threat Detection Examples

SCAN RESULTS: customer_import.csv
════════════════════════════════════════════════════════════

āœ“ Malware Scan:     Clean (ClamAV 1.2.0)
āœ“ Format Valid:     CSV with 1,234 rows
⚠ Integrity Issues: 23 rows with missing email

SECURITY THREATS DETECTED:
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¬ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│ Row 47  │ SQL INJECTION ATTEMPT                             │
│         │ Value: "'; DROP TABLE Customers;--"               │
│         │ Action: Row rejected, logged, alert sent          │
ā”œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¤
│ Row 156 │ PII IN NOTES FIELD                                │
│         │ Found: SSN (confidence: 98%)                      │
│         │ Action: Redacted to "XXX-XX-XXXX"                 │
ā”œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¤
│ Row 892 │ POTENTIAL DATA LEAK                               │
│         │ Found: API key pattern in description             │
│         │ Action: Row quarantined for review                │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”“ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜

RESULT: 1,210 rows ready for import
        23 rows need review (missing data)
        1 row rejected (SQL injection)

Configuration

# sql2ai-receive.yaml
security:
  malware:
    enabled: true
    engine: clamav
    quarantine_path: /secure/quarantine/

  pii_detection:
    enabled: true
    action: redact  # or 'reject', 'flag'
    entities:
      - SSN
      - CREDIT_CARD
      - EMAIL_ADDRESS

  sql_injection:
    enabled: true
    action: reject
    log_attempts: true
    alert_on_detection: true

  integrity:
    validate_schema: true
    required_fields: [id, email, created_at]
    encoding: utf-8

sources:
  file_upload:
    endpoint: /api/receive/files
    max_size: 100MB
    allowed_types: [csv, xlsx, json]

  webhook:
    endpoint: /api/receive/webhook
    auth: hmac_signature
    secret: ${WEBHOOK_SECRET}

  email:
    imap_server: imap.company.com
    poll_interval: 5m
    allowed_senders: ["*@partner.com"]

Security Dashboard

╔══════════════════════════════════════════════════════════════════╗
ā•‘                    SQL RECEIVE SECURITY                           ā•‘
╠══════════════════════════════════════════════════════════════════╣
ā•‘ LAST 24 HOURS                                                     ā•‘
ā•‘ ─────────────────────────────────────────────────────────────── ā•‘
ā•‘ Items Processed:  4,721                                           ā•‘
ā•‘ Clean:            4,683 (99.2%)                                   ā•‘
ā•‘ Threats Blocked:  38                                              ā•‘
╠══════════════════════════════════════════════════════════════════╣
ā•‘ THREAT BREAKDOWN                                                  ā•‘
ā•‘ ─────────────────────────────────────────────────────────────── ā•‘
ā•‘ Malware:              2                                           ā•‘
ā•‘ SQL Injection:        8                                           ā•‘
ā•‘ PII Detected:         23 (redacted)                              ā•‘
ā•‘ Data Leaks:           5 (quarantined)                            ā•‘
╠══════════════════════════════════════════════════════════════════╣
ā•‘ BY SOURCE                                                         ā•‘
ā•‘ ─────────────────────────────────────────────────────────────── ā•‘
ā•‘ File Upload:      2,341 | 3 threats                              ā•‘
ā•‘ API Webhook:      1,892 | 4 threats                              ā•‘
ā•‘ Email Inbox:      488   | 31 threats                             ā•‘
ā•šā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•ā•

Secure Your Inbound Data

Multi-layer security scanning for all data entering your database.

No credit card required • Free for individual developers