alloydb-omni-health
Audited by Socket on Apr 29, 2026
3 alerts found:
Anomalyx3This module is primarily a launcher that dynamically executes an external package/tool via npx with a fixed tool and version, while forwarding nearly the entire environment (including values optionally loaded from a local .env) and appending user-supplied CLI arguments without allowlisting. There is no direct malicious code pattern in this snippet, but it materially increases operational/supply-chain risk due to delegated execution and sensitive environment propagation (especially when GEMINI_CLI=1) and the use of shell:true on Windows.
No direct malicious payload is visible in this module; it functions as a wrapper that invokes an external tool via npx. However, it introduces meaningful security risk: (1) it performs runtime execution via npx of a third-party dependency, and (2) it broadens data exposure by passing a largely unrestricted environment (including values derived from a local .env file and CLAUDE_PLUGIN_OPTION_* variables) and forwarding arbitrary CLI arguments to the executed dependency. This should be reviewed under a least-privilege and secret-handling threat model, and the invoked tool/package should be treated as untrusted until verified.
No obvious in-file backdoor/malware behavior is present; the code primarily acts as a runtime execution wrapper. However, it meaningfully increases security risk by executing a third-party tool via `npx` and by forwarding a large amount of potentially sensitive configuration (including repository-local `.env` contents when GEMINI_CLI is set) into that tool’s environment, with inherited stdio that could leak data into logs if the dependency prints or processes these values.