I don’t understand the point the posts are trying to make. If an attacker can get at the SQL database, they must have remote access, i.e. the system is compromised somehow. What’s stopping them from getting at anything else? Why should we concerned about the database specifically?
Or just bake 'em.