cloud-sql-postgres-data
Audited by Socket on Apr 28, 2026
3 alerts found:
Anomalyx3No direct malicious code is evident in this wrapper. However, it increases supply-chain and secret-exposure risk by (1) conditionally reading a local .env file and forwarding its values to a runtime-executed dependency via npx, and (2) forwarding unvalidated user CLI arguments to that tool. On Windows, shell:true marginally increases execution-surface complexity. Review and harden downstream tool behavior and ensure execution environments protect/avoid leaking sensitive env values to logs or the dependency.
This module functions as a launcher for a database/SQL-capable tool executed via runtime npx. While it does not itself contain overt malware behavior (no clear exfiltration, no hardcoded secrets, no obfuscation), it substantially increases security exposure by (1) executing third-party code at runtime via npx and (2) forwarding almost all environment variables (including optionally merged local .env contents) plus arbitrary user-provided arguments into a tool named execute_sql. The invoked dependency’s behavior and argument validation determine the final impact; this wrapper should be reviewed for secret-handling and input validation controls outside this file.
No explicit malware behavior is evident in this snippet (no obfuscation, no direct exfiltration logic, no eval/Function/backdoor patterns). However, the code creates a meaningful security/supply-chain risk by executing a third-party package at runtime via npx and forwarding nearly all environment variables—including optionally loading and merging a local ../../../.env file—into that child process. User-supplied CLI arguments are also passed through to the invoked tool with no validation, increasing the need for scrutiny of the invoked @toolbox-sdk/server behavior and for restricting/allow-listing forwarded environment variables.