alloydb-omni-monitor
Audited by Socket on Apr 29, 2026
2 alerts found:
Anomalyx2No direct evidence of in-module malware (backdoor, crypto-mining, or explicit exfiltration) is present; the code is primarily an execution wrapper. However, it introduces meaningful security risk by (1) launching a versioned third-party package/tool via npx at runtime and (2) passing through environment variables that may include secrets from a local ../../../.env (or mapped CLAUDE_PLUGIN_OPTION_* values) into the spawned process. On Windows, shell:true further increases the importance of scrutinizing argument handling and the invoked tool’s safety.
This module is not self-contained business logic; it is a runtime delegator that invokes an external npx-fetched dependency and passes through (almost) the entire environment. It conditionally reads a local .env file and forwards its contents to the spawned process, creating a plausible secret exposure pathway. The most significant security concerns are supply-chain/runtime delegation via npx and broad environment forwarding to a child process; Windows shell:true is an additional edge-case risk. No explicit malware indicators are evident in this file alone.