cloud-sql-mysql-lifecycle

Warn

Audited by Socket on Apr 29, 2026

4 alerts found:

Anomalyx4
AnomalyLOW
scripts/clone_instance.js

No explicit in-module malicious payload is evident (no obfuscation, no eval, no network calls, no filesystem modification). However, this wrapper executes external code via npx (@toolbox-sdk/server@1.1.0) and runs a specific operation ('clone_instance'), while passing through unvalidated user CLI arguments and forwarding a potentially secret-containing environment—especially when GEMINI_CLI=1 causes merging of a local ../../../.env file into the child process environment. The primary concerns are supply-chain execution-at-runtime risk and secret exposure to downstream tooling. Recommend reviewing the invoked tool’s behavior, restricting/validating CLI args, and minimizing secret propagation (avoid loading .env unless required, and allow-list env keys).

Confidence: 62%Severity: 62%
AnomalyLOW
scripts/create_backup.js

No clear evidence of overt malware in this module. However, it is a sensitive execution wrapper: it may load secrets from a local ../../../.env file and forwards the resulting environment to an external npx-executed dependency/tool (pinned version but still a delegated execution surface). The script also forwards user-supplied CLI arguments directly to that tool, and on Windows enables shell mode, increasing the importance of robust downstream argument handling. Overall risk is driven by secret propagation and supply-chain delegation, not by observable backdoor behavior in the provided code.

Confidence: 72%Severity: 58%
AnomalyLOW
scripts/wait_for_operation.js

No overt malware logic is present in this module, but it acts as an orchestrator that (1) conditionally loads a local .env file and forwards its key/value pairs to a subprocess, and (2) executes an npm package via npx at runtime (supply-chain/code-execution risk). On Windows it also uses shell:true, slightly increasing risk around argument handling. Overall risk is moderate: review and restrict which environment keys are imported, avoid storing sensitive values in .env for this mode, and ensure the npx target/package is trusted and controlled (e.g., lockfiles/registry policy, CI-only resolution, and minimizing forwarded env).

Confidence: 63%Severity: 56%
AnomalyLOW
scripts/get_instance.js

No clear malicious payload is present in this wrapper code itself (no obfuscation, no eval, no direct network/exfiltration logic). However, it has meaningful supply-chain and secret-forwarding risk because it executes an external dependency via npx (@toolbox-sdk/server@1.1.0) and broadly forwards environment variables into that child process, including values merged from a local '../../../.env' file when GEMINI_CLI is enabled. User-provided CLI arguments are also forwarded to the invoked tool without validation in this module. This warrants review of the invoked tool’s behavior and careful handling of .env/CI secrets and npx execution controls.

Confidence: 62%Severity: 62%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:20 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Fcloud-sql-mysql%2Fcloud-sql-mysql-lifecycle%2F@e1f5708857fc9ef4e6116b85108666da36fb5068