The query returns fast. Too fast. You see the data stream across your terminal—cleartext values from columns no one should read. Pgcli makes working with PostgreSQL feel sharp and alive, but when sensitive columns leak in query results, speed becomes risk.
Sensitive columns in PostgreSQL hold data regulated by compliance rules: personal identifiers, financial details, security tokens. When you query with Pgcli, these fields are just as exposed as any other column unless you actively design for safety. The problem isn’t Pgcli itself—it’s default SQL behavior combined with the convenience of autocomplete and table exploration. Every SELECT * pulls in everything, every row, every column.
To control exposure, start by auditing your schema. Identify sensitive columns—names, emails, addresses, payment info, dates of birth—anything that your organization’s policy flags as restricted. In PostgreSQL, use column-level privileges to limit read access. Apply GRANT SELECT only to safe columns for non-admin roles. Pgcli will respect the underlying database permissions; if a user role cannot select a column, it disappears from autocomplete and result sets.