prisma-7
Audited by Socket on Mar 18, 2026
1 alert found:
AnomalyThis code is not obfuscated and contains no obvious malware constructs, but the provided API example is highly risky: it accepts arbitrary SQL queries from request bodies and executes them directly against the database, and the example sets CORS to '*' and does not perform authentication or authorization. In a real deployment this would allow anyone who can reach the endpoint to read, modify, or delete database data (data exfiltration and destructive operations). The tutorial correctly calls out the need to add auth and change CORS for production, but the example itself should not be used as-is in a public-facing environment. Recommend adding strict authentication/authorization, restricting CORS to trusted origins, validating or limiting allowed queries, and using a least-privilege database account for the endpoint.