alloydb-postgres-data
Audited by Socket on Apr 28, 2026
5 alerts found:
Anomalyx5This file does not show overt malware, but it does delegate execution to an external package via npx and forwards a broad set of environment variables (including values read from a local .env) into that executed code. Combined with Windows shell execution and forwarding of caller-controlled CLI args without validation, the module presents a moderate supply-chain/secret-handling security risk rather than clear malicious intent.
No direct evidence of malware in this module. However, it increases supply-chain/execution risk by running a third-party dependency via `npx` at runtime and forwarding a broad environment (optionally populated from a local `.env`) plus user-controlled CLI arguments into the spawned tool. The main items to review are the integrity/pinning of `@toolbox-sdk/server@1.1.0`, the expected/allowed CLI options for `list_tables`, and whether sensitive env vars should be allowlisted rather than wholesale forwarded—especially given `shell: true` on Windows.
This module functions as a launcher/wrapper that runs `@toolbox-sdk/server@1.1.0` via `npx` to invoke `list_stored_procedure`, forwarding user-provided CLI arguments and passing through (and sometimes importing) environment variables into the child process. There is no direct evidence of overt malware in the wrapper code itself, but there are meaningful security risks: (1) delegation to an external `npx`-executed tool, (2) secret propagation by reading `../../../.env` and forwarding its contents to the child, and (3) increased command-injection/escaping impact on Windows due to `shell: true` plus forwarded arguments. The invoked package’s behavior should be reviewed as the primary risk driver.
No explicit malicious payload (exfiltration, backdoor logic, or obfuscation) is evident in this wrapper alone. However, it launches an external npx-based package at runtime and forwards user-supplied CLI arguments into a tool explicitly named 'execute_sql', while also importing and broadly forwarding local .env and environment variables. This creates elevated supply-chain and operational risk if the downstream tool is permissive or if sensitive credentials/config are injected into the child environment.
No strong indicators of direct in-file malware (e.g., backdoor logic, network exfiltration, credential theft, or dynamic code execution) are present in this wrapper. The main security concerns are (1) executing external code via npx for a fixed third-party package/version and invoking a tool with forwarded user arguments, and (2) conditionally reading ../../../.env and propagating its contents into the environment of that subprocess, which can expose secrets to third-party execution. Windows shell:true increases command-line parsing/interpretation risk compared to non-shell execution.