cloud-sql-mysql-monitor
Audited by Socket on Apr 29, 2026
2 alerts found:
Anomalyx2No strong evidence of intentional malware in this wrapper itself (no obfuscation, no direct network activity, no persistence), but it meaningfully increases security exposure by executing a third-party package via npx at runtime and forwarding a large, potentially secret-bearing environment (including optional values loaded from a local .env) to the spawned process. On Windows, shell:true further enlarges the risk surface for argument handling. Overall: moderate supply-chain/runtime and credential-exposure risk; should be reviewed/mitigated by minimizing env forwarding, restricting .env usage, and verifying npx/toolbox integrity and provenance (e.g., lockfiles/integrity checks, least-privilege execution).
No strong in-module malicious indicators are evident in this wrapper. The main risks are supply-chain/execution delegation via npx/@toolbox-sdk/server@1.1.0 and potential sensitive-data exposure because the script may read a local .env file and pass its contents (plus the full process environment) to the spawned external tool, with stdio inherited into logs. Review and constrain the invoked dependency’s trust/behavior and avoid loading secrets into the environment unless necessary.