alloydb-omni-replication

Warn

Audited by Socket on Apr 29, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/replication_stats.js

This module itself contains no overt obfuscated malware logic or direct data exfiltration. However, it acts as a runtime executor for an external package/tool via npx and forwards environment variables (including potentially secret material imported from a local ../../../.env when GEMINI_CLI=1) and unvalidated user CLI arguments to that subprocess. The primary concerns are supply-chain execution risk and potential secret exposure through environment propagation and inherited stdio; review the invoked @toolbox-sdk/server@1.1.0/replication_stats behavior and the contents/handling of the local .env in the intended usage environment.

Confidence: 62%Severity: 58%
AnomalyLOW
scripts/list_publication_tables.js

No direct malicious code is evident in this wrapper, but it meaningfully increases risk by (1) executing an external tool via npx (supply-chain/external execution), (2) optionally loading secrets from a local ../../../.env into the environment passed to that external process, and (3) using shell:true on Windows while forwarding unvalidated CLI arguments. This warrants review/hardening (argument allowlisting, avoid shell on Windows, and minimize secret propagation) in the calling threat model.

Confidence: 62%Severity: 62%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:19 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Falloydb-omni%2Falloydb-omni-replication%2F@0c401ed3b9bf340bac6b532fb092e366f5e0fa01