Client Demo Mode

Snowflake permissions are time-dependent graph resolution

Use this demo to show how database future grants, schema overrides, object grants, and creation time combine into real production breakage.

Cases 64 Meaningful grant combinations mapped into one dashboard.
Core Chain R1 -> R2 -> R3 Access granted to R1 flows upward, but R2 never flows back down to R1.
Demo Pages 4 Fintech, e-commerce, healthcare, and SaaS client stories.
Signals 0 Live anomalies detected in the current session.

Why Clients Care

A team can be β€œgreen” at the database level and still lose access to the very next table because a schema-level future grant quietly changed after the pipeline was built.

Database future grants Schema overrides Object-level grants Temporal drift

Fast Demo Flow

1

Run Setup Environment once to create roles, schemas, and Snowflake wiring.

2

Open any page and click Run All Steps to watch real SQL execute live.

3

Use the Grant Source column plus the MIT Event Feed to explain exactly why access changed.

Priority Use Cases

Real business scenarios you can demo live

64-Case Permission Matrix

Click any cell for a quick classifier.

Compliant vs fragmented vs override vs escalation
Compliant Fragmented Override Escalation

Resolution Rules

Precedence

Object grant > Schema future > Database future

Role Hierarchy

R1Baseline runtime
->
R2Ops analytics
->
R3Compliance
+
R4Isolated external

Granting a table to R1 makes it effectively visible to R1, R2, and R3. Granting a table to R2 does not restore visibility back to R1.

Detection Rules

ACCESS_FRAGMENTATION ACCESS_LOSS ESCALATION OBJECT_OVERRIDE GRANT_WIPE