alloydb-omni-monitor

Warn

Audited by Socket on Apr 29, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/list_locks.js

No direct evidence of in-module malware (backdoor, crypto-mining, or explicit exfiltration) is present; the code is primarily an execution wrapper. However, it introduces meaningful security risk by (1) launching a versioned third-party package/tool via npx at runtime and (2) passing through environment variables that may include secrets from a local ../../../.env (or mapped CLAUDE_PLUGIN_OPTION_* values) into the spawned process. On Windows, shell:true further increases the importance of scrutinizing argument handling and the invoked tool’s safety.

Confidence: 63%Severity: 58%
AnomalyLOW
scripts/long_running_transactions.js

This module is not self-contained business logic; it is a runtime delegator that invokes an external npx-fetched dependency and passes through (almost) the entire environment. It conditionally reads a local .env file and forwards its contents to the spawned process, creating a plausible secret exposure pathway. The most significant security concerns are supply-chain/runtime delegation via npx and broad environment forwarding to a child process; Windows shell:true is an additional edge-case risk. No explicit malware indicators are evident in this file alone.

Confidence: 66%Severity: 63%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:19 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Falloydb-omni%2Falloydb-omni-monitor%2F@70e218ba458833ae759b4e44540c6513e9a63e0b