cloud-sql-mysql-monitor

Warn

Audited by Socket on Apr 29, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/list_active_queries.js

No strong evidence of intentional malware in this wrapper itself (no obfuscation, no direct network activity, no persistence), but it meaningfully increases security exposure by executing a third-party package via npx at runtime and forwarding a large, potentially secret-bearing environment (including optional values loaded from a local .env) to the spawned process. On Windows, shell:true further enlarges the risk surface for argument handling. Overall: moderate supply-chain/runtime and credential-exposure risk; should be reviewed/mitigated by minimizing env forwarding, restricting .env usage, and verifying npx/toolbox integrity and provenance (e.g., lockfiles/integrity checks, least-privilege execution).

Confidence: 60%Severity: 60%
AnomalyLOW
scripts/get_query_plan.js

No strong in-module malicious indicators are evident in this wrapper. The main risks are supply-chain/execution delegation via npx/@toolbox-sdk/server@1.1.0 and potential sensitive-data exposure because the script may read a local .env file and pass its contents (plus the full process environment) to the spawned external tool, with stdio inherited into logs. Review and constrain the invoked dependency’s trust/behavior and avoid loading secrets into the environment unless necessary.

Confidence: 66%Severity: 55%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:21 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Fcloud-sql-mysql%2Fcloud-sql-mysql-monitor%2F@037db83456c6fa371bb5205c4c8f23792ab57d05