alloydb-omni-access-control
Warn
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The scripts use the
npxutility to download and execute the@toolbox-sdk/serverpackage from the npm registry. This occurs every time a script is run if the package is not cached. - [REMOTE_CODE_EXECUTION]: By fetching and running the
@toolbox-sdk/serverpackage at runtime, the skill performs remote code execution. The security of the skill is dependent on the integrity of this external package. - [COMMAND_EXECUTION]: The scripts utilize
child_process.spawnto execute shell commands. On Windows platforms, theshell: trueoption is used, and user-provided arguments are passed into the command line, which may present a surface for command injection if input is not strictly validated by the agent. - [DATA_EXFILTRATION]: The scripts attempt to read and parse a
.envfile located at a relative path (../../../.env). This involves accessing sensitive local files that typically contain credentials, API keys, and other environment-specific secrets.
Audit Metadata