alloydb-postgres-health

Warn

Audited by Socket on Apr 28, 2026

6 alerts found:

Anomalyx6
AnomalyLOW
scripts/list_invalid_indexes.js

No direct malicious logic is visible in this module (no eval/dynamic execution, no network/file exfiltration, no backdoor code). However, it conditionally reads a local .env file and forwards the resulting environment (potentially containing secrets like database credentials or API keys) to an external package executed via npx, while also passing through arbitrary CLI arguments. This makes the overall supply-chain and sensitive-data-handling risk moderate and primarily depends on the behavior and trustworthiness of the npx-resolved dependency/toolchain.

Confidence: 66%Severity: 60%
AnomalyLOW
scripts/list_top_bloated_tables.js

This module is a thin execution wrapper that primarily increases supply-chain/execution risk by delegating to `npx @toolbox-sdk/server@1.1.0` at runtime and by forwarding environment variables—including those imported from a local `../../../.env` in GEMINI mode—to the invoked tool. It also forwards user-controlled CLI arguments without semantic validation. No direct malicious/payload behavior is evident in this file, but the security posture hinges on the external dependency and the sensitivity of the environment being passed.

Confidence: 62%Severity: 55%
AnomalyLOW
scripts/list_autovacuum_configurations.js

No direct indicators of intentional malware (no eval/dynamic code, no persistence, no explicit exfiltration). The wrapper primarily increases risk by (1) executing an external dependency via npx at runtime (supply-chain surface) and (2) optionally reading a local .env file and forwarding its contents into the environment of the executed dependency, which could lead to sensitive data exposure depending on what the invoked tool logs/uses. Additional concern: on Windows, spawn(..., {shell:true}) increases command execution surface, though arguments are mostly passed as an array and Windows quoting is partially handled.

Confidence: 62%Severity: 62%
AnomalyLOW
scripts/get_instance.js

This module is best characterized as a delegation wrapper with a meaningful supply-chain and secret-exposure surface: it executes a third-party package via npx and forwards merged environment variables (potentially including a local .env file) and arbitrary user CLI arguments into that external tool. No clear in-file malware/backdoor logic is present, but security review should focus on the invoked dependency/tool behavior and the sensitivity of the environment variables being passed.

Confidence: 70%Severity: 52%
AnomalyLOW
scripts/list_table_stats.js

No explicit malware logic is visible in this wrapper. However, it creates meaningful supply-chain and secret-propagation risk by executing a runtime-fetched dependency via npx and passing an environment that may include values loaded from a local .env file (when GEMINI_CLI is enabled) and user-provided CLI arguments (forwarded without validation) to that external tool. On Windows, shell-enabled spawning further increases the need for careful argument handling downstream.

Confidence: 66%Severity: 57%
AnomalyLOW
scripts/list_tablespaces.js

No direct malicious payload is evident in this wrapper code (no exfiltration, persistence, or network activity), but it materially increases operational/supply-chain risk by invoking an external npm package via npx and by passing a largely unfiltered environment to that subprocess. When enabled, it also reads a local .env file and forwards its contents to the child process; additionally, it forwards arbitrary user CLI arguments directly to the downstream invocation. These factors justify security review in the context of how the invoked tool uses environment variables and arguments.

Confidence: 62%Severity: 56%
Audit Metadata
Analyzed At
Apr 28, 2026, 10:28 PM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Falloydb%2Falloydb-postgres-health%2F@49658833e2b5cb98ff5c5b6443ba9aaef3f2c0b4