alloydb-omni-optimize

Warn

Audited by Socket on Apr 29, 2026

3 alerts found:

Anomalyx3
AnomalyLOW
scripts/list_available_extensions.js

No overt malware/backdoor behavior is visible in this wrapper code, but it does execute a third-party dependency at runtime via npx and forwards caller-controlled CLI arguments to that tool. The most significant concern is secret propagation: when GEMINI_CLI=1 it reads '../../../.env' and passes its key/value pairs into the environment of the spawned subprocess, and when CLAUDEDECODE=1 it forwards all CLAUDE_PLUGIN_OPTION_* variables without validation. This creates a elevated supply-chain and data exposure risk even though this file alone does not show explicit malicious actions.

Confidence: 58%Severity: 63%
AnomalyLOW
scripts/list_columnar_configurations.js

No direct malware is evident in this module; it is a delegating CLI wrapper that runs a pinned npx tool. The notable security concerns are: (1) it reads a local ../../../.env and broadens the child environment with its keys, (2) it forwards essentially the entire parent environment (and CLAUDE_PLUGIN_OPTION_* mappings) into the spawned dependency, and (3) it enables shell:true on Windows with only partial argument quoting. These factors can amplify the impact of a compromised dependency or misconfigured runtime secrets/arguments, even though this file itself contains no explicit exfiltration or backdoor logic.

Confidence: 67%Severity: 56%
AnomalyLOW
scripts/list_memory_configurations.js

No explicit malicious payload is visible in this wrapper code (no eval/Function, no file modification, no direct network exfiltration). However, it materially increases security exposure by (1) loading a local .env file under GEMINI_CLI and merging it into the environment, (2) forwarding essentially all environment variables to an external process, (3) copying all CLAUDE_PLUGIN_OPTION_* variables without allowlisting, and (4) passing unvalidated user CLI arguments to the invoked tool. The main supply-chain/security risk here is that any sensitive environment data or unexpected arguments become available to the npx-executed dependency/tool; review the downstream tool’s handling and whether untrusted users can influence process.argv or relevant environment flags.

Confidence: 62%Severity: 60%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:19 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Falloydb-omni%2Falloydb-omni-optimize%2F@6ec6dcd69e4aaf3cbc3cfa91188c160b73868506