cloud-sql-mysql-data

Warn

Audited by Socket on Apr 29, 2026

4 alerts found:

Anomalyx4
AnomalyLOW
scripts/get_query_plan.js

No strong in-module malicious indicators are evident in this wrapper. The main risks are supply-chain/execution delegation via npx/@toolbox-sdk/server@1.1.0 and potential sensitive-data exposure because the script may read a local .env file and pass its contents (plus the full process environment) to the spawned external tool, with stdio inherited into logs. Review and constrain the invoked dependency’s trust/behavior and avoid loading secrets into the environment unless necessary.

Confidence: 66%Severity: 55%
AnomalyLOW
scripts/list_tables.js

No direct evidence of intentional malware (no embedded backdoor/exfiltration logic) in this wrapper. However, it meaningfully increases security exposure by (1) executing an external tool via runtime `npx` delegation to `@toolbox-sdk/server@1.1.0`, and (2) optionally reading a local `.env` and forwarding its contents (potentially sensitive DB parameters) to the spawned process. CLI arguments are also forwarded without validation, and Windows uses `shell: true`, elevating the importance of safe argument handling in the invoked tool.

Confidence: 62%Severity: 62%
AnomalyLOW
scripts/execute_sql.js

No direct malware behavior is evident in this wrapper (no obfuscation, no exfiltration, no persistence). The main security concerns are (1) it forwards local .env secrets and broad environment variables into a spawned external process that performs SQL execution, and (2) it delegates SQL-capable functionality to a third-party package via runtime npx execution, meaning downstream argument handling and dependency integrity are critical. Treat as a high-impact execution wrapper requiring strict controls on argv and environment provenance.

Confidence: 62%Severity: 62%
AnomalyLOW
scripts/list_active_queries.js

No strong evidence of intentional malware in this wrapper itself (no obfuscation, no direct network activity, no persistence), but it meaningfully increases security exposure by executing a third-party package via npx at runtime and forwarding a large, potentially secret-bearing environment (including optional values loaded from a local .env) to the spawned process. On Windows, shell:true further enlarges the risk surface for argument handling. Overall: moderate supply-chain/runtime and credential-exposure risk; should be reviewed/mitigated by minimizing env forwarding, restricting .env usage, and verifying npx/toolbox integrity and provenance (e.g., lockfiles/integrity checks, least-privilege execution).

Confidence: 60%Severity: 60%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:19 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Fcloud-sql-mysql%2Fcloud-sql-mysql-data%2F@c04705434b88afdff058c7c05075419e88d5653a