alloydb-omni-replication
Audited by Socket on Apr 29, 2026
2 alerts found:
Anomalyx2This module itself contains no overt obfuscated malware logic or direct data exfiltration. However, it acts as a runtime executor for an external package/tool via npx and forwards environment variables (including potentially secret material imported from a local ../../../.env when GEMINI_CLI=1) and unvalidated user CLI arguments to that subprocess. The primary concerns are supply-chain execution risk and potential secret exposure through environment propagation and inherited stdio; review the invoked @toolbox-sdk/server@1.1.0/replication_stats behavior and the contents/handling of the local .env in the intended usage environment.
No direct malicious code is evident in this wrapper, but it meaningfully increases risk by (1) executing an external tool via npx (supply-chain/external execution), (2) optionally loading secrets from a local ../../../.env into the environment passed to that external process, and (3) using shell:true on Windows while forwarding unvalidated CLI arguments. This warrants review/hardening (argument allowlisting, avoid shell on Windows, and minimize secret propagation) in the calling threat model.