alloydb-postgres-replication
Audited by Socket on Apr 28, 2026
3 alerts found:
Anomalyx3This module is best characterized as a delegation wrapper with a meaningful supply-chain and secret-exposure surface: it executes a third-party package via npx and forwards merged environment variables (potentially including a local .env file) and arbitrary user CLI arguments into that external tool. No clear in-file malware/backdoor logic is present, but security review should focus on the invoked dependency/tool behavior and the sensitivity of the environment variables being passed.
No direct evidence of malicious payload (e.g., backdoor, exfiltration, reverse shell) is present in this snippet. The primary security concern is supply-chain/execution amplification: the script conditionally loads a local .env file and forwards its contents into the environment of an externally executed npx package/tool, while also passing arbitrary user CLI arguments without validation. This warrants review of the invoked @toolbox-sdk/server behavior and a check that only trusted inputs are used (especially in GEMINI_CLI mode).
This module is a subprocess launcher that delegates real work to `npx @toolbox-sdk/server@1.1.0 invoke list_publication_tables`. It conditionally reads a local `.env` file and forwards a largely complete environment (and user-provided CLI arguments) to the spawned child process. No explicit malware primitives are present in the snippet, but the supply-chain/runtime execution trust boundary and potential secret propagation to the child process create a moderate security risk that depends on the behavior and trustworthiness of the invoked `@toolbox-sdk/server` tooling.