alloydb-postgres-replication

Warn

Audited by Socket on Apr 28, 2026

3 alerts found:

Anomalyx3
AnomalyLOW
scripts/get_instance.js

This module is best characterized as a delegation wrapper with a meaningful supply-chain and secret-exposure surface: it executes a third-party package via npx and forwards merged environment variables (potentially including a local .env file) and arbitrary user CLI arguments into that external tool. No clear in-file malware/backdoor logic is present, but security review should focus on the invoked dependency/tool behavior and the sensitivity of the environment variables being passed.

Confidence: 70%Severity: 52%
AnomalyLOW
scripts/list_instances.js

No direct evidence of malicious payload (e.g., backdoor, exfiltration, reverse shell) is present in this snippet. The primary security concern is supply-chain/execution amplification: the script conditionally loads a local .env file and forwards its contents into the environment of an externally executed npx package/tool, while also passing arbitrary user CLI arguments without validation. This warrants review of the invoked @toolbox-sdk/server behavior and a check that only trusted inputs are used (especially in GEMINI_CLI mode).

Confidence: 64%Severity: 57%
AnomalyLOW
scripts/list_publication_tables.js

This module is a subprocess launcher that delegates real work to `npx @toolbox-sdk/server@1.1.0 invoke list_publication_tables`. It conditionally reads a local `.env` file and forwards a largely complete environment (and user-provided CLI arguments) to the spawned child process. No explicit malware primitives are present in the snippet, but the supply-chain/runtime execution trust boundary and potential secret propagation to the child process create a moderate security risk that depends on the behavior and trustworthiness of the invoked `@toolbox-sdk/server` tooling.

Confidence: 62%Severity: 52%
Audit Metadata
Analyzed At
Apr 28, 2026, 10:25 PM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Falloydb%2Falloydb-postgres-replication%2F@69247441cde6421d23cd4ea7710b7cc705af301c