cloud-sql-mysql-lifecycle
Audited by Socket on Apr 29, 2026
4 alerts found:
Anomalyx4No explicit in-module malicious payload is evident (no obfuscation, no eval, no network calls, no filesystem modification). However, this wrapper executes external code via npx (@toolbox-sdk/server@1.1.0) and runs a specific operation ('clone_instance'), while passing through unvalidated user CLI arguments and forwarding a potentially secret-containing environment—especially when GEMINI_CLI=1 causes merging of a local ../../../.env file into the child process environment. The primary concerns are supply-chain execution-at-runtime risk and secret exposure to downstream tooling. Recommend reviewing the invoked tool’s behavior, restricting/validating CLI args, and minimizing secret propagation (avoid loading .env unless required, and allow-list env keys).
No clear evidence of overt malware in this module. However, it is a sensitive execution wrapper: it may load secrets from a local ../../../.env file and forwards the resulting environment to an external npx-executed dependency/tool (pinned version but still a delegated execution surface). The script also forwards user-supplied CLI arguments directly to that tool, and on Windows enables shell mode, increasing the importance of robust downstream argument handling. Overall risk is driven by secret propagation and supply-chain delegation, not by observable backdoor behavior in the provided code.
No overt malware logic is present in this module, but it acts as an orchestrator that (1) conditionally loads a local .env file and forwards its key/value pairs to a subprocess, and (2) executes an npm package via npx at runtime (supply-chain/code-execution risk). On Windows it also uses shell:true, slightly increasing risk around argument handling. Overall risk is moderate: review and restrict which environment keys are imported, avoid storing sensitive values in .env for this mode, and ensure the npx target/package is trusted and controlled (e.g., lockfiles/registry policy, CI-only resolution, and minimizing forwarded env).
No clear malicious payload is present in this wrapper code itself (no obfuscation, no eval, no direct network/exfiltration logic). However, it has meaningful supply-chain and secret-forwarding risk because it executes an external dependency via npx (@toolbox-sdk/server@1.1.0) and broadly forwards environment variables into that child process, including values merged from a local '../../../.env' file when GEMINI_CLI is enabled. User-provided CLI arguments are also forwarded to the invoked tool without validation in this module. This warrants review of the invoked tool’s behavior and careful handling of .env/CI secrets and npx execution controls.